Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.
Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.
"synopsis" may belong to another edition of this title.
Dr. Timothy Shimeall is an Adjunct Professor of the Heinz College of Carnegie Mellon University, with teaching and research interests focused in the area of information survivability. He is an active instructor in information security management and information warfare, and has led a variety of survivability-related independent studies. Tim is also a senior member of the technical staff with the CERT Network Situational Awareness Group of Carnegie Mellon’s Software Engineering Institute, where he is responsible for overseeing and participating in the development of analysis methods in the area of network systems security and survivability. This work includes development of methods to identify trends in security incidents and in the development of software used by computer and network intruders. Of particular interest are incidents affecting defended systems and malicious software that are effective despite common defenses. Prior to his time at Carnegie Mellon, Tim was an Associate Professor at the Naval Postgraduate School in Monterey, CA.
Jonathan Spring is a member of the technical staff with the CERT Network Situational Awareness Group of the Software Engineering Institute, Carnegie Mellon University. He began working at CERT in 2009. He also serves as an adjunct professor at the University of Pittsburgh’s School of Information Sciences. His current research topics include monitoring cloud computing and DNS traffic analysis. He holds a Master’s degree in information security and a Bachelor’s degree in philosophy from the University of Pittsburgh.
"...this is a top-down approach to securing an organisation, helping you to understand how all the pieces fit together...The people most likely to benefit...are IT staff who don’t necessarily have a great deal of experience in security."--Network Security,December 1 2013
This work can best serve as a supplemental general resource to accompany a more-technical work on information security (IS)...overall, the text is well-written and engaging...Summing Up: Recommended"--CHOICE,August 1 2014
"If you want to roll your sleeves up and do the computer equivalent of getting your hands greasy under the bonnet, this book will take you through hosts, firewalls, passwords, phishing and the like. Thanks partly to case studies and profiles, the authors never forget that infosec is about people, both the good guys and the fraudsters and hackers."--Professional Security Magazine Online, May 28, 2014
"The book provides a good balance between the broad aspects of information security, privacy and risk management; without overwhelming the novice with far too much minutiae...For those looking for an introduction to the topic, that nonetheless provides a comprehensive overview of the relevant areas, Introduction to Information Security: A Strategic-Based Approach is an excellent reference."--RSAConference.com, May 7, 2014
"As an American book, it covers US law on the subject...If you want to roll your sleeves up and do the computer equivalent of getting your hands greasy under the bonnet, this book will take you through hosts, firewalls, passwords, phishing and the like. Thanks partly to case studies and profiles, the authors never forget that infosec is about people, both the good guys and the fraudsters and hackers."--Professional Security Magazine Online, March 31, 2014
"Along with being an excellent discussion for the security professional, this book is ideally suited for use as a textbook at the undergraduate or graduate level,...For professionals and students alike, the book offers two outstanding features throughout the text: profiles of individuals who made important contributions to the field, and descriptions of real-world attacks that led to many of the technologies and methods discussed."--ComputingReviews.com, February 25, 2014
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00074697683
Quantity: 1 available
Seller: One Planet Books, Columbia, MO, U.S.A.
paperback. Condition: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing and/or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Seller Inventory # 001500648U
Quantity: 1 available
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New.SoftCover International edition. Different ISBN and Cover image but contents are same as US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEJUNE24-281579
Quantity: 4 available
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-3001
Quantity: 1 available
Seller: Grumpys Fine Books, Tijeras, NM, U.S.A.
Paperback. Condition: new. Prompt service guaranteed. Seller Inventory # Clean1597499692
Quantity: 1 available
Seller: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condition: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Seller Inventory # 001500648U
Quantity: 1 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 384 3:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Gloss Lam. Seller Inventory # 53995975
Quantity: 3 available
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New. Seller Inventory # 6666-ELS-9781597499699
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 1st edition. 382 pages. 9.25x7.75x1.00 inches. In Stock. Seller Inventory # __1597499692
Quantity: 2 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 384. Seller Inventory # 2654547992
Quantity: 3 available