Free Downloads
Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance)

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. The first part of Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access contol programs. It then looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. The final part is a resource for students and professionals which disucsses putting access control systems to work as well as testing and managing them.

Series: Information Systems Security & Assurance

Paperback: 398 pages

Publisher: Jones & Bartlett Learning; 1 edition (September 24, 2010)

Language: English

ISBN-10: 0763791288

ISBN-13: 978-0763791285

Product Dimensions: 7.5 x 0.8 x 9.2 inches

Shipping Weight: 1.6 pounds (View shipping rates and policies)

Average Customer Review: 4.0 out of 5 stars  See all reviews (6 customer reviews)

Best Sellers Rank: #297,498 in Books (See Top 100 in Books) #15 in Books > Computers & Technology > Hardware & DIY > Microprocessors & System Design > Control Systems #262 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #365 in Books > Textbooks > Computer Science > Networking

Book is a little jumbled, assumes you know something about every topic and discusses the content in that manner. It could be a good reference item if needed to look up something. From a learning perspective, hands on is the best way to go.

Very informative and great educational tool for securing your infrastructure. If you don't know what you don't know, then buy this book, read and be amazed as to what your corporate risk profile is. Ask for a pay raise, once you comprehend and begin implementing the contents of this book.

Good book. Requires some updates that are related to the threats of biometric authentication techniques as well as to mentioning that MD5 hashing is not recommended to use anymore.

Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance) Access Control, Authentication, And Public Key Infrastructure (Jones & Bartlett Learning Information Systems Security) Fundamentals Of Information Systems Security (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance) Laboratory Manual To Accompany Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance Series) Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Information Assurance Handbook: Effective Computer Security and Risk Management Strategies Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) ISO/IEC 27002:2005, Information technology - Security techniques - Code of practice for information security management (Redesignation of ISO/IEC 17799:2005) The Manual to Online Public Records: The Researcher's Tool to Online Resources of Public Records and Public Information Key West D.O.A.: A Jack Marsh Briar Malone Key West Action Thriller (Key West Action Thriller Series Book 6) Security, ID Systems and Locks: The Book on Electronic Access Control Master Locksmithing: An Expert's Guide to Master Keying, Intruder Alarms, Access Control Systems, High-Security Locks... Design Research in Information Systems: Theory and Practice: 22 (Integrated Series in Information Systems) What's Yours is Mine: Open Access and the Rise of Infrastructure Socialism Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery (The Morgan Kaufmann Series in Data Management Systems) Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection