|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Michael G. Solomon , David KimPublisher: Jones and Bartlett Publishers, Inc Imprint: Jones and Bartlett Publishers, Inc Edition: 2nd Revised edition Weight: 0.851kg ISBN: 9781284145472ISBN 10: 1284145476 Publication Date: 15 August 2017 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: To order Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us. Table of ContentsReviewsAuthor InformationMichael G. Solomon, PhD, CISSP, PMP, CISM, CySA+, Pentest+, is an author, educator, and consultant focusing on privacy, security, blockchain, and identity management. As an IT professional and consultant since 1987, Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to more than 30 books and numerous training courses. Dr. Solomon is a Professor of Computer and Information Sciences at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University. David Kim is the president of Security Evolutions, Inc. (SEI; www.security-evolutions.com), located outside the Washington, DC, metropolitan area. SEI provides governance, risk, and compliance consulting services for public and private sector clients globally. SEI’s clients include healthcare institutions, banking institutions, governments, and international airports. SEI’s IT security consulting services include security risk assessments, vulnerability assessments, compliance audits, and designing of layered security solutions for enterprises. In addition, available services include developing business continuity and disaster recovery plans. Mr. Kim’s IT and IT security experience encompasses more than 30+ years of technical engineering, technical management, and sales and marketing management. This experience includes LAN/WAN, internetworking, enterprise network management, and IT security for voice, video, and data networking infrastructures. He is an accomplished author and part-time adjunct professor who enjoys teaching cybersecurity to students across the United States. Tab Content 6Author Website:Countries AvailableAll regions |