Linked e-resources
Details
Table of Contents
Introduction
Information Systems Security
Malicious Attacks, Threats, and Vulnerabilities
Access Controls
Security Operations and Administration
Auditing, Testing, and Monitoring
Risk, Response, and Recovery
Cryptography
Networks and Telecommunications Security
Source Code Security
Information Security Standards
Information Systems Security Education and Training
U.S. Compliance Laws
Conclusion.
Information Systems Security
Malicious Attacks, Threats, and Vulnerabilities
Access Controls
Security Operations and Administration
Auditing, Testing, and Monitoring
Risk, Response, and Recovery
Cryptography
Networks and Telecommunications Security
Source Code Security
Information Security Standards
Information Systems Security Education and Training
U.S. Compliance Laws
Conclusion.