Series: Information Systems Security & Assurance
Paperback: 544 pages
Publisher: Jones & Bartlett Learning; 2 edition (July 25, 2013)
Product Dimensions: 7.3 x 1.2 x 9.1 inches
Shipping Weight: 2 pounds (View shipping rates and policies)
Average Customer Review: 4.3 out of 5 stars See all reviews (21 customer reviews)
Best Sellers Rank: #127,964 in Books (See Top 100 in Books) #114 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #156 in Books > Textbooks > Computer Science > Networking #361 in Books > Computers & Technology > Security & Encryption
This one drove me batty. The class that required this also required a special code to access additional materials. This was the first time that this isn't included with the book. As it turned out, the class and my college had a special package set up for this, but wasn't advertised by the class or school until after i discovered the lack of a code. The rating is a warning for other folks taking a class that requires the book. Consult your professor to make sure there isn't some extra material that's supposed be part of the class. This book, new from , does not include any additional codes or materials.I suspect this is by design and the schools offering these classes decide if they will require additional materials. Check before you buy.However the material in the book itself is good for the class. especially if you're new to Info Systems Security.
I purchased this book for a class in information security. From the perspective of the class this book filled the bill and was helpful and useful. From the perspective of overall information security this book is somewhat lacking. It focuses on the security inside a system, not network/internet wide security. Although it states what it says are requirements for a WAN it really looks at that from the perspective a multilayer LAN. Macro infrastructure is not included in the list of domains covered by this view of Information Systems Security. I am certain this comes from the (ISC)2 construct of IS. It fails to address the security requirements or the vulnerabilities associated with Network Management Systems and the associated supervisory control and data acquisition (SCADA) systems. Without a holistic view of all levels of required security this book leaves the student lacking a key part of the entire security picture. Long standing physical vulnerabilities to IS infrastructure persist. The IT professional should be made aware of them since they are in the best position to advocate for improvement and risk reduction or mitigation. This book does not provide the background information for that.
Used it in a masters program. The professor seemed to think that this was the best place to get all his info form; not from the textbook that was defined for the class. Once I got this, exams and homework was much easier!!
It's good, but the virtual labs component of it sucks. It took me HOURS to do each one, and my internet connection is a fairly standard speed. I just hated that so many steps of it involve sitting around and WAITING for it to load.
the wording of this book is awkward. i needed it for a class, so glad i knew most of what was in that class and the rest was common sense.
Excellent we used this book in school and it was just awesome
Great way to start if you are interested in learning about computer security. Good quality rental is pretty dope.
I had to purchase this textbook for a college course. It was very informative.
Fundamentals Of Information Systems Security (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance) Laboratory Manual To Accompany Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance Series) Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance) Information Assurance Handbook: Effective Computer Security and Risk Management Strategies Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) ISO/IEC 27002:2005, Information technology - Security techniques - Code of practice for information security management (Redesignation of ISO/IEC 17799:2005) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) Software Testing: Essential Skills for First Time Testers: Software Quality Assurance:From scratch to end Quality Assurance for Textiles and Apparel 2nd Edition Trust in Jesus: Hymns of Assurance for Organ (Manuals Only) Quality Assurance for Biopharmaceuticals Angels: Ringing Assurance that We Are Not Alone Fundamentals of Nursing: Human Health and Function (Craven, Fundamentals of Nursing: Human Health and Functionraven, Fundamentals of Nurs) Design Research in Information Systems: Theory and Practice: 22 (Integrated Series in Information Systems) CompTIA Security+ Guide to Network Security Fundamentals Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts Implementing Information Security in Healthcare: Building a Security Program (HIMSS Book Series)