Security Planning

An Applied Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Planning by Susan Lincke, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Susan Lincke ISBN: 9783319160276
Publisher: Springer International Publishing Publication: June 11, 2015
Imprint: Springer Language: English
Author: Susan Lincke
ISBN: 9783319160276
Publisher: Springer International Publishing
Publication: June 11, 2015
Imprint: Springer
Language: English

This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serves entry level cyber-security courses through those in advanced security planning. Exercises range from easier questions to the challenging case study. This is the first text with an optional semester-long case study: Students plan security for a doctor’s office, which must adhere to HIPAA regulation. For software engineering-oriented students, a chapter on secure software development introduces security extensions to UML and use cases (with case study). The text also adopts the NSA’s Center of Academic Excellence (CAE) revamped 2014 plan, addressing five mandatory and 15 Optional Knowledge Units, as well as many ACM Information Assurance and Security core and elective requirements for Computer Science.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serves entry level cyber-security courses through those in advanced security planning. Exercises range from easier questions to the challenging case study. This is the first text with an optional semester-long case study: Students plan security for a doctor’s office, which must adhere to HIPAA regulation. For software engineering-oriented students, a chapter on secure software development introduces security extensions to UML and use cases (with case study). The text also adopts the NSA’s Center of Academic Excellence (CAE) revamped 2014 plan, addressing five mandatory and 15 Optional Knowledge Units, as well as many ACM Information Assurance and Security core and elective requirements for Computer Science.

More books from Springer International Publishing

Cover of the book A Differential Approach to Geometry by Susan Lincke
Cover of the book Leadership in Extreme Situations by Susan Lincke
Cover of the book Ad Hoc Networks by Susan Lincke
Cover of the book E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life by Susan Lincke
Cover of the book Canadian Perspectives on Immigration in Small Cities by Susan Lincke
Cover of the book Future Viability, Business Models, and Values by Susan Lincke
Cover of the book The “Other” In 9/11 Literature by Susan Lincke
Cover of the book Location-Based Social Media by Susan Lincke
Cover of the book Cognitive Theory and Documentary Film by Susan Lincke
Cover of the book São Francisco Craton, Eastern Brazil by Susan Lincke
Cover of the book Offending from Childhood to Young Adulthood by Susan Lincke
Cover of the book Languages, Design Methods, and Tools for Electronic System Design by Susan Lincke
Cover of the book Respectable Deviance and Purchasing Medicine Online by Susan Lincke
Cover of the book Verifiable Composition of Signature and Encryption by Susan Lincke
Cover of the book Governance and Sustainability of Responsible Research and Innovation Processes by Susan Lincke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy