This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the Mc Cumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. Mc Cumber details how information extracted from this resource can be applied to his assessment processes.
Koop dit e-boek en ontvang er nog 1 GRATIS!
Formaat EPUB ● Pagina’s 288 ● ISBN 9781135488963 ● Uitgeverij CRC Press ● Gepubliceerd 2004 ● Downloadbare 3 keer ● Valuta EUR ● ID 6781327 ● Kopieerbeveiliging Adobe DRM
Vereist een DRM-compatibele e-boeklezer