9781119101604-1119101603-Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information ... Networks Security), Book Cover May Vary

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information ... Networks Security), Book Cover May Vary

ISBN-13: 9781119101604
ISBN-10: 1119101603
Edition: 2
Author: Stuart Jacobs
Publication date: 2015
Publisher: IEEE
Format: Hardcover 751 pages
FREE US shipping
Rent
35 days
from $21.95 USD
FREE shipping on RENTAL RETURNS
Buy

From $68.75

Rent

From $21.95

Book details

ISBN-13: 9781119101604
ISBN-10: 1119101603
Edition: 2
Author: Stuart Jacobs
Publication date: 2015
Publisher: IEEE
Format: Hardcover 751 pages

Summary

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information ... Networks Security), Book Cover May Vary (ISBN-13: 9781119101604 and ISBN-10: 1119101603), written by authors Stuart Jacobs, was published by IEEE in 2015. With an overall rating of 4.2 stars, it's a notable title among other Internet, Groupware, & Telecommunications (Networking & Cloud Computing, Telecommunications & Sensors, Engineering) books. You can easily purchase or rent Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information ... Networks Security), Book Cover May Vary (Hardcover, Used) from BooksRun, along with many other new and used Internet, Groupware, & Telecommunications books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $24.05.

Description

Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information.

  • Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networks
  • Covers internal operations security processes of monitors, review exceptions, and plan remediation
  • Over 15 new sections
  • Instructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam
If you are an instructor and adopted this book for your course, please email ieeeproposals@wiley.com to get access to the additional instructor materials for this book.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book