Information and Network Security Management: Strategic Concept Applications

Author:   Richmond S Adebiaye ,  Dr Richmond S Adebiaye
Publisher:   Createspace Independent Publishing Platform
ISBN:  

9781491236338


Pages:   396
Publication Date:   08 November 2013
Format:   Paperback
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $295.68 Quantity:  
Add to Cart

Share |

Information and Network Security Management: Strategic Concept Applications


Add your own review!

Overview

Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students' support questions and answers can be requested directly from the author. Key features in this textbook include various security protocols and architecture definitions to understanding what Information Security and Assurance are. This book veered deeply into specifics of Network security in information processing and Management. This textbook teaches and focuses on the techniques, policies, operational procedures, and technologies needed to design, implement, administer, secure, and troubleshoot Computer networks and common security procedures. Topics like Information Security Requirements and Threats, Network Security Assessments, Risk and Threat Analysis, Security against common Network attacks, Principles of Cryptography in Internetworking, Intrusion Detection Systems and Management and other important security and management procedures were analyzed. Students and other IT and security professionals will find this textbook exceedingly useful.

Full Product Details

Author:   Richmond S Adebiaye ,  Dr Richmond S Adebiaye
Publisher:   Createspace Independent Publishing Platform
Imprint:   Createspace Independent Publishing Platform
Dimensions:   Width: 15.00cm , Height: 3.00cm , Length: 22.90cm
Weight:   0.726kg
ISBN:  

9781491236338


ISBN 10:   1491236337
Pages:   396
Publication Date:   08 November 2013
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Reviews

Author Information

Dr. Richmond S. Adebiaye is a Professor of Computer Information Systems, Information Security expert, Academic Administrator and Researcher. He has over twelve (12) years' experience teaching various Computer Information Systems and Security courses. He also consults in the field of Database Design, Management and Security, Digital Forensics, Penetration, Vulnerability Testing, CyberSspace and CyberSecurity, Intrusion Detection and Prevention, Application Security Analysis and Development. He is presently the Program Director of Computer & Information Systems at Parker University, Dallas, Texas. He was the former Program Chair, CS/IT, Denver Campuses for Colorado Technical University. Dr. Adebiaye earned his Doctorate in Information Systems and Communications from Robert Morris University, Moon Township, PA, and his Master of Science in Information Security from Lewis University, Romeoville, IL., and his Bachelor of Science in Computer Information Systems from Northwestern University, Evanston, IL. He is a Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) and CCIE. His main expertise and research interests involve Designing, Building, Managing Enterprise Network and Information Security Programs.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List