Firewalls are among the best-known network security tools in use today. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software and related tools. This title explores firewalls in the context [...]
"Guide To Network Security, International Edition" is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with[...]
PRINCIPLES OF INCIDENT RESPONSE & DISASTER RECOVERY, 2E, International Edition presents methods to identify vulnerabilities within computer networks and the countermeasures that mitigate risks and damage. From market-leading content on contingency planning, to effective techniques that minimize down[...]
Beginning with the foundational and technical components of information security, this title focuses on access control models, information security governance, and information security program assessment and metrics.[...]
Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus[...]
A work from Cengage Learning on "Hands-On Information Security Lab Manual".
Management of Information Security primarily focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information securi[...]
A work from Cengage Learning on "Readings & Cases in Information Security: Law & Ethics".
A book on Roadmap to Information Security: For IT and Infosec Managers.