Normal view MARC view ISBD view

Laboratory manual to accompany access control, authentication, and public key infrasturcture.

Series: Jones & Bartlett Learning information systems security & assurance series.Burlington, MA : Jones & Bartlett Learning, ©2013Edition: 1E revised.Description: x, 157 pages : illustrations ; 28 cm.Content type: text ISBN: 9781449638399.Subject(s): Computer security -- Laboratory manuals | Computers -- Access control | Public key cryptographyDDC classification: 005.8 L11 Summary: This revised and updated second edition defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It is a student and professional resource that details how to put access control systems to work as well as testing and managing them. New to this edition: updated references to Windows 8 and Outlook 2011; a discussion of recent Chinese hacking incidence; examples depicting the risks associated with a missing unencrypted laptop containing private data. Additionally, new sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added, as well as new information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA)
Item type Current location Collection Call number Status Date due Barcode
Books Books College Library
General Circulation Section
GC GC 005.8 L11 (Browse shelf) Available 80623

This revised and updated second edition defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It is a student and professional resource that details how to put access control systems to work as well as testing and managing them. New to this edition: updated references to Windows 8 and Outlook 2011; a discussion of recent Chinese hacking incidence; examples depicting the risks associated with a missing unencrypted laptop containing private data. Additionally, new sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added, as well as new information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA)

College of Engineering and Computer Studies Bachelor of Science in Computer Science

There are no comments for this item.

Log in to your account to post a comment.