Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
The practice of preventing unauthorized access, disruption, disclosure and destruction of information in order to ensure the protection of confidentiality and integrity of data is known as information security. Some of the threats to information security include theft of intellectual property, identity theft, software attacks, information extortion and sabotage. Such risks can be managed by identification of assets, threat and vulnerability assessment, impact calculation and implementing appropriate control measures. The management of such threats and risks is done through security controls, access controls, defense in depth and cryptography. There has been rapid progress in the domain of information security and its applications are finding their way across multiple industries. Most of the topics introduced in this book cover new techniques and applications of information security. Coherent flow of topics, student-friendly language and extensive use of examples make this book an invaluable source of knowledge.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
The practice of preventing unauthorized access, disruption, disclosure and destruction of information in order to ensure the protection of confidentiality and integrity of data is known as information security. Some of the threats to information security include theft of intellectual property, identity theft, software attacks, information extortion and sabotage. Such risks can be managed by identification of assets, threat and vulnerability assessment, impact calculation and implementing appropriate control measures. The management of such threats and risks is done through security controls, access controls, defense in depth and cryptography. There has been rapid progress in the domain of information security and its applications are finding their way across multiple industries. Most of the topics introduced in this book cover new techniques and applications of information security. Coherent flow of topics, student-friendly language and extensive use of examples make this book an invaluable source of knowledge.