Normal view MARC view ISBD view

Laboratory manual to accompany access control, authentication, and public key infrasturcture.

Series: Jones & Bartlett Learning information systems security & assurance series.Burlington, MA : Jones & Bartlett Learning, ©2013Edition: 1E revised.Description: x, 157 pages : illustrations ; 28 cm.Content type: text ISBN: 9781449638399.Subject(s): Computer security -- Laboratory manuals | Computers -- Access control | Public key cryptographyDDC classification: 005.8/L11 Summary: This revised and updated second edition defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It is a student and professional resource that details how to put access control systems to work as well as testing and managing them. New to this edition: updated references to Windows 8 and Outlook 2011; a discussion of recent Chinese hacking incidence; examples depicting the risks associated with a missing unencrypted laptop containing private data. Additionally, new sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added, as well as new information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA)
No physical items for this record

This revised and updated second edition defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It is a student and professional resource that details how to put access control systems to work as well as testing and managing them. New to this edition: updated references to Windows 8 and Outlook 2011; a discussion of recent Chinese hacking incidence; examples depicting the risks associated with a missing unencrypted laptop containing private data. Additionally, new sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added, as well as new information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA)

College of Engineering and Computer Studies

There are no comments for this item.

Log in to your account to post a comment.