Information Security Principles and Practices
List price: $150.80
Buy it from $1.00
This item qualifies for FREE shipping
*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.
30 day, 100% satisfaction guarantee
If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.
Learn more about our returns policy
Description: For an introductory course in information security covering principles and practices. nbsp; This text covers the ten domains in the Information Security Common Body of Knowledge, which are Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Limited time offer:
Get the first one free!
All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.
List price: $150.80
Copyright year: 2006
Publisher: Prentice Hall PTR
Publication date: 8/19/2005
Size: 7.50" wide x 9.00" long x 0.75" tall
|Why Study Information Security?|
|Information Security Principles of Success|
|Certification Programs and the Common Body of Knowledge|
|Security Architecture and Models|
|Business Continuity Planning and Disaster Recovery Planning|
|Law, Investigations, and Ethics|
|Physical Security Control|
|Access Control Systems and Methodology|
|Telecommunications, Network, and Internet Security|
|Application Development Security|
|Securing the Future|
|Common Body of Knowledge|
|Security Policy and Standards Taxonomy|
|HIPAA Security Rule Standards|