Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
|
Buy Now
Information Assurance Architecture (Paperback)
Loot Price: R1,786
Discovery Miles 17 860
|
|
Information Assurance Architecture (Paperback)
Expected to ship within 12 - 17 working days
|
Now that information has become the lifeblood of your organization,
you must be especially vigilant about assuring it. The hacker, spy,
or cyber-thief of today can breach any barrier if it remains
unchanged long enough or has even the tiniest leak. In Information
Assurance Architecture, Keith D. Willett draws on his over 25 years
of technical, security, and business experience to provide a
framework for organizations to align information assurance with the
enterprise and their overall mission. The Tools to Protect Your
Secrets from Exposure This work provides the security industry with
the know-how to create a formal information assurance architecture
that complements an enterprise architecture, systems engineering,
and the enterprise life cycle management (ELCM). Information
Assurance Architecture consists of a framework, a process, and many
supporting tools, templates and methodologies. The framework
provides a reference model for the consideration of security in
many contexts and from various perspectives; the process provides
direction on how to apply that framework. Mr. Willett teaches
readers how to identify and use the right tools for the right job.
Furthermore, he demonstrates a disciplined approach in thinking
about, planning, implementing and managing security, emphasizing
that solid solutions can be made impenetrable when they are
seamlessly integrated with the whole of an enterprise. Understand
the Enterprise Context This book covers many information assurance
subjects, including disaster recovery and firewalls. The objective
is to present security services and security mechanisms in the
context of information assurance architecture, and in an enterprise
context of managing business risk. Anyone who utilizes the concepts
taught in these pages will find them to be a valuable weapon in the
arsenal of information protection.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.