ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Computer Architecture

Information Security Science: Measuring the Vulnerability to Data Compromises

| £58.28 | €65.55 | Ca$94.56 | Au$93.32
by Carl Young
What is this?DRM-EPUB by download  |  $69.95
What is this?DRM-PDF by download  |  $69.95
add to wish list
Information Security Science: Measuring the Vulnerability to Data Compromises by Carl Young

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.

In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.

This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

  • Specifies the analytic and scientific methods necessary to estimate the vulnerability to information loss for a spectrum of threats and attack vectors
  • Represents a unique treatment of the nexus between physical and information security that includes risk analyses of IT device emanations, visible information, audible information, physical information assets, and virtualized IT environments
  • Identifies metrics that point to the root cause of information technology risk and thereby assist security professionals in developing risk management strategies
  • Analyzes numerous threat scenarios and specifies countermeasures based on derived quantitative metrics
  • Provides chapter introductions and end-of-chapter summaries to enhance the reader's experience and facilitate an appreciation for key concepts

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 850339

Ebook Details
Pages: 406
Size: 20.6 MB
Publisher: Syngress
Date published:   2016
ISBN: 2370007560905 (DRM-EPUB)
9780128096468 (DRM-PDF)

DRM Settings
Read Aloud:  not allowed

This product is listed in the following category:

Nonfiction > Computers > Computer Architecture

This author has products in the following categories:

Nonfiction > Computers > Security
Nonfiction > Political Science > Political Freedom & Security > International Security
Nonfiction > Computers > Internet > Security
Nonfiction > Political Science > Political Freedom & Security > Terrorism
Nonfiction > Computers > Computer Architecture

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016