Security Planning

An Applied Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Planning by Susan Lincke, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Susan Lincke ISBN: 9783319160276
Publisher: Springer International Publishing Publication: June 11, 2015
Imprint: Springer Language: English
Author: Susan Lincke
ISBN: 9783319160276
Publisher: Springer International Publishing
Publication: June 11, 2015
Imprint: Springer
Language: English

This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serves entry level cyber-security courses through those in advanced security planning. Exercises range from easier questions to the challenging case study. This is the first text with an optional semester-long case study: Students plan security for a doctor’s office, which must adhere to HIPAA regulation. For software engineering-oriented students, a chapter on secure software development introduces security extensions to UML and use cases (with case study). The text also adopts the NSA’s Center of Academic Excellence (CAE) revamped 2014 plan, addressing five mandatory and 15 Optional Knowledge Units, as well as many ACM Information Assurance and Security core and elective requirements for Computer Science.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serves entry level cyber-security courses through those in advanced security planning. Exercises range from easier questions to the challenging case study. This is the first text with an optional semester-long case study: Students plan security for a doctor’s office, which must adhere to HIPAA regulation. For software engineering-oriented students, a chapter on secure software development introduces security extensions to UML and use cases (with case study). The text also adopts the NSA’s Center of Academic Excellence (CAE) revamped 2014 plan, addressing five mandatory and 15 Optional Knowledge Units, as well as many ACM Information Assurance and Security core and elective requirements for Computer Science.

More books from Springer International Publishing

Cover of the book Performance and Civic Engagement by Susan Lincke
Cover of the book Energy Poverty by Susan Lincke
Cover of the book J.W.R. Whitehand and the Historico-geographical Approach to Urban Morphology by Susan Lincke
Cover of the book Progress in Ultrafast Intense Laser Science XI by Susan Lincke
Cover of the book Understanding Oil and Gas Shows and Seals in the Search for Hydrocarbons by Susan Lincke
Cover of the book Biometric Recognition by Susan Lincke
Cover of the book Ocular Drug Delivery: Advances, Challenges and Applications by Susan Lincke
Cover of the book Sustainable Agriculture Reviews 28 by Susan Lincke
Cover of the book Information Systems: Development, Research, Applications, Education by Susan Lincke
Cover of the book Computational Intelligence for Pattern Recognition by Susan Lincke
Cover of the book Melanoma by Susan Lincke
Cover of the book Functional Analysis by Susan Lincke
Cover of the book Complex Networks VII by Susan Lincke
Cover of the book Data Activism and Social Change by Susan Lincke
Cover of the book Bleach Plant Effluents from the Pulp and Paper Industry by Susan Lincke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy