Books

5 results found
Title Authors Description OpenBook ID
Assessing and managing security risk in IT systems Assessing and managing security risk in IT systems John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… OL13638173W
Codes Codes Richard A Mollin From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potentia… OL15170247W
Public Key Infrastructure Public Key Infrastructure John R Vacca With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… OL15172981W
A Practical Guide to Security Assessments A Practical Guide to Security Assessments Sudhanshu Kairab The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mi… OL8636700W
Building an effective information security policy architecture Building an effective information security policy architecture Sandy Bacik Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards … OL9767255W