被引数量: 19
馆藏高校

斯坦福大学

哥伦比亚大学

麻省理工大学

普林斯顿大学

加州大学伯克利分校

康奈尔大学

牛津大学

加州理工学院

Engineering Information Security —— The Application of Systems Engineering Concepts to Achieve Information Assurance

----- 工程信息安全:系统工程概念来实现信息安全保障,第二版的应用

ISBN: 9781119101604 出版年:2015 页码:784 Stuart Jacobs Wiley

知识网络
内容简介

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society.For solution manual, contact ieeepress@ieee.org

Amazon评论
UltraViv

This book is very dated! It uses old terminology and makes references to terms and phrases, but fails to go in depth into those areas. Furthermore, context is poorly structured at times. This book appears to e written like a college essay rather than a professional textbook.

Ralph Melone

I used this book as a textbook in my information Assurance class at AMU The book does a good job presenting a systems engineering approach to various aspects of cyber security

M

I feel like much of the content was repeated too many times or unnecessary and the index in the back was useless, but otherwise it was a very informative book.

Erik

I rented this book through my college bookstore for use in a network security class. Like other reviewers, I found the book to be mediocre in terms of presentation, unnecessarily long in some sections, and poorly written in others. The material is helpful in communicating information assurance principles and does cover several security related topics, but the degree of error in the book could easily inhibit comprehension for low-tech readers. There are typos on almost every page, several occurrences of no spaces between words, and obvious errors throughout. If you don’t have background in the material, I’d advise to go elsewhere for an overview of information security. Some typos are so bad that the average reader might spend hours trying to figure out what the author is trying to convey in the text - only to realize later that the author (say) screwed up which IP address they meant to reference in a NAT table.

Kevin

It's not bad however, I did not find the resource to be well organized. Content is all over the place. Early chapters are unnecessarily long and portions consist of many bullet lists. It gets tiring of reading list after list. Middle chapters focus on networking where some abbreviations are seemingly made up. The material should be broken up and presented in a consistent way. There are better ways of delivering the content. Last 3rd of the book is better and I do like the intro and summary sections.

UltraViv

This book is very dated! It uses old terminology and makes references to terms and phrases, but fails to go in depth into those areas. Furthermore, context is poorly structured at times. This book appears to e written like a college essay rather than a professional textbook.

Ralph Melone

I used this book as a textbook in my information Assurance class at AMUThe book does a good job presenting a systems engineering approach to various aspects of cyber security

M

I feel like much of the content was repeated too many times or unnecessary and the index in the back was useless, but otherwise it was a very informative book.

Erik

I rented this book through my college bookstore for use in a network security class. Like other reviewers, I found the book to be mediocre in terms of presentation, unnecessarily long in some sections, and poorly written in others. The material is helpful in communicating information assurance principles and does cover several security related topics, but the degree of error in the book could easily inhibit comprehension for low-tech readers. There are typos on almost every page, several occurrences of no spaces between words, and obvious errors throughout. If you don’t have background in the material, I’d advise to go elsewhere for an overview of information security. Some typos are so bad that the average reader might spend hours trying to figure out what the author is trying to convey in the text - only to realize later that the author (say) screwed up which IP address they meant to reference in a NAT table.

Kevin

It's not bad however, I did not find the resource to be well organized. Content is all over the place. Early chapters are unnecessarily long and portions consist of many bullet lists. It gets tiring of reading list after list. Middle chapters focus on networking where some abbreviations are seemingly made up. The material should be broken up and presented in a consistent way. There are better ways of delivering the content. Last 3rd of the book is better and I do like the intro and summary sections.

作品图片
推荐图书