Bundles and Virtual Lab Access are available on the Ordering Options tab.
For questions about ordering this title, please contact ISSAsupport@jblearning.com.
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.
- Maps fully to the six major domains of the CompTIA Security+ SYO-401 Certification exam
- Updated to include coverage on recent compliance law and standards updates, including FISMA, NIST SP800-171, and PCI DSS v3.2
- New content on advanced malware and APT attacks to the end points such as ransomware and crypto locker
- Addresses data breach and data breach incident response planning
- Introduces recent "Internet of Things" risk threats and privacy issues
- Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more: http://www.issaseries.com/
Part 1 The Need for Information Security
Chapter 1 Information Systems Security
Chapter 2 The Internet of Things is Changing How We Live
Chapter 3 Malicious Attacks, Threats, and Vulnerabilities
Chapter 4 The Drivers of the Information Security Business
Part 2 Securing Today’s Information Systems
Chapter 5 Access controls
Chapter 6 Security Operations and Administration
Chapter 7 Auditing, Testing, and Monitoring
Chapter 8 Risk, Response, and Recovery
Chapter 9 Cryptography
Chapter 10 Networks and Telecommunications
Chapter 11 Malicious Code and Activity
Part 3 Information Security Standards, Education, Certifications, and Laws
Chapter 12 Information Security Standards
Chapter 13 Information Systems Security Education and Training
Chapter 14 Information Security Professional Certifications
Chapter 15 U.S. Compliance Laws
David Kim-President and Chief Security Officer, Security Evolutions, Inc., Fairfax, Virginia
David Kim is the President & Principal Consultant at Security Evolutions, Inc. (SEI) located outside the metropolitan Washington, D.C. area in Northern Virginia. SEI provides governance, risk, and compliance consulting including security and privacy regulations for public and private sector clients globally. Mr. Kim’s IT and IT security experiences encompasses more than 30+ years of regulatory compliance, technical IT and security engineering, and IT organizational management. He is an accomplished author and part-time adjunct professor who enjoys teaching cybersecurity to students across the United States.
Additional Titles by this Author
- ISBN-13: 9781284239645
- ISBN-13: 9781284060140
- ISBN-13: 9781284070590
Michael G. Solomon, PhD, CISSP, PMP, CISM-Solomon Consulting Inc.
Michael G. Solomon, Ph.D., CISSP, PMP, CISM, is a full-time security and OpenEdge speaker, consultant, and author who specializes in leading teams in achieving and maintaining secure IT environments. As an IT professional and consultant since 1987, he has led projects for numerous major organizations and has authored and contributed to multiple books and training courses. From 1998 until 2001, he was an instructor in the Kennesaw State University’s Computer Science and Information Sciences (CSIS) department, currently teaches graduate Information System Security courses at the University of the Cumberlands, and holds a PhD in Computer Science and Informatics from Emory University.
Additional Titles by this Author
- ISBN-13: 9781284108064
- ISBN-13: 9781284090703
- ISBN-13: 9781284104110