9781284198355-1284198359-Access Control and Identity Management (Information Systems Security & Assurance)

Access Control and Identity Management (Information Systems Security & Assurance)

ISBN-13: 9781284198355
ISBN-10: 1284198359
Edition: 3
Author: Mike Chapple
Publication date: 2020
Publisher: Jones & Bartlett Learning
Format: Paperback 376 pages
FREE US shipping
Rent
35 days
from $15.54 USD
FREE shipping on RENTAL RETURNS
Buy

From $29.98

Rent

From $15.54

Book details

ISBN-13: 9781284198355
ISBN-10: 1284198359
Edition: 3
Author: Mike Chapple
Publication date: 2020
Publisher: Jones & Bartlett Learning
Format: Paperback 376 pages

Summary

Access Control and Identity Management (Information Systems Security & Assurance) (ISBN-13: 9781284198355 and ISBN-10: 1284198359), written by authors Mike Chapple, was published by Jones & Bartlett Learning in 2020. With an overall rating of 3.6 stars, it's a notable title among other Network Security (Security & Encryption, Networking & Cloud Computing) books. You can easily purchase or rent Access Control and Identity Management (Information Systems Security & Assurance) (Paperback, Used) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $7.44.

Description

PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIESSeries meets all standards put forth by CNSS 4011 & 4013A!Access control protects resources against unauthorized viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast-paced field, Access Control and Identity Management defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. Focusing on Identity and Security Management, this new edition looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. This valuable resource provides both students and professional with details and procedures on implementing access control systems as well as managing and testing those systems.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book