Information Technology Security Fundamentals

Information Technology Security Fundamentals

by Glen Sagers
English | 2016 | ISBN: 1606499165 | 174 Pages | PDF | 1.11 MB

One of the fastest growing issues in Information Technology (IT) is the increasing need for security, both internal and external, to protect valuable enterprise data and resources. IT security is a multifaceted field that includes both technical and behavioral components. Managers must have at least a general understanding of both for effective security. Adding further complexity is the diversity of technologies that need protection, ranging from operating systems to mobile applications and databases to networking hardware. The objective of this book is to assist managers in understanding the role of IT Security in their enterprise. The book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and further builds by discussing higher level management issues like security policy, secure application development and penetration testing strategies. Each chapter demonstrates concepts and underscores what issues can occur and what strategies can be applied at each level to implement a successful IT security plan. The book concludes with case studies and integrated strategies for implementing security program for an organization, as well as highlighting current trends in security and future security and information assurance concerns that are on the horizon for organizations.


[Fast Download] Information Technology Security Fundamentals

Ebooks related to "Information Technology Security Fundamentals" :
Computer Security - ESORICS 2014, Part II
Multimedia Forensics and Security: Foundations, Innovations, and Applications
Transactions on Computational Science XXIX
Advanced Penetration Testing for Highly-Secured Environments, Second Edition
Advanced Computing and Systems for Security: Volume Four (Advances in Intelligent Systems and Comput
Predicting Security Threats with Splunk: Getting to Know Splunk
Data Protection for Virtual Data Centers
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
AutoCAD 2011 Tutor for Engineering Graphics
Computer Hacking
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.