Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
The protection of confidentiality, integrity and availability of data, while ensuring policy implementation and organizational productivity is the primary focus of information security. An evaluation of the assets, threats, vulnerabilities, impacts and effectiveness of control measures is crucial for developing an effective risk management plan. The threats to information security can be in the form of software attacks, intellectual property thefts, sabotage and information extortion. Some common examples of software attacks are viruses, Trojan horses, phishing attacks and worms. This book is a compilation of chapters that discuss the most vital concepts and emerging trends in the field of information security. The various advancements in this field are glanced at and their applications as well as ramifications are looked at in detail. For all readers who are interested in information security, the case studies included in this book will serve as an excellent guide to develop a comprehensive understanding.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
The protection of confidentiality, integrity and availability of data, while ensuring policy implementation and organizational productivity is the primary focus of information security. An evaluation of the assets, threats, vulnerabilities, impacts and effectiveness of control measures is crucial for developing an effective risk management plan. The threats to information security can be in the form of software attacks, intellectual property thefts, sabotage and information extortion. Some common examples of software attacks are viruses, Trojan horses, phishing attacks and worms. This book is a compilation of chapters that discuss the most vital concepts and emerging trends in the field of information security. The various advancements in this field are glanced at and their applications as well as ramifications are looked at in detail. For all readers who are interested in information security, the case studies included in this book will serve as an excellent guide to develop a comprehensive understanding.