Principles of Incident Response and Disaster Recovery

#ad
Cengage Learning #ad - Used book in Good Condition. From market-leading content on contingency planning, to effective techniques that minimize downtime in an emergency, to curbing losses after a breach, this text is the resource needed in case of a network intrusion. Principles of incident response & disaster recovery, 2nd edition presents methods to identify vulnerabilities within computer networks and the countermeasures that mitigate risks and damage.

#ad



Managing Risk in Information Systems Information Systems Security & Assurance

#ad
Jones & Bartlett Learning #ad - Instructor's material for managing risk in information Systems include: PowerPoint Lecture Slides Instructor's Guide Course Syllabus Quiz & Exam Questions Case Scenarios/Handouts Jones Bartlett Publishers. Written by industry experts, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and using a wealth of examples and exercises, and the anatomy of how to create a plan that reduces risk.

. Note: this book will not include an access code part of the jones & bartlett learning information systems security & assurance series revised and updated with the latest data in the field, Response, the Second Edition of Managing Risk in Information Systems provides a comprehensive overview of the SSCP Risk, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance.

#ad



Guide to Network Defense and Countermeasures

#ad
Cengage Learning #ad - Guide to network defense and countermeasures provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, proxy servers, network address translation NAT, packet filtering and analysis, virtual private networks VPN, and network traffic signatures.

Guide to Network Defense and Countermeasures #ad - Used book in Good Condition. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Thoroughly updated, and techniques including virtualization, trends, and ICMPv6 structure, the new third edition reflects the latest technology, VMware, IPv6, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats.

Perfect for students and professionals alike in this high-demand, guide to netwORK DEFENSE AND COUNTERMEASURES, fast-growing field, Third Edition, is a must-have resource for success as a network security professional. Jones Bartlett Publishers.

#ad



Principles of Information Security

#ad
Cengage Learning #ad - Jones Bartlett Publishers. Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding.

Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. Used book in Good Condition. Updates address technical security controls, digital forensics, and ethical issues in IS security, emerging legislative issues, making this the ideal IS resource for business decision makers.

Principles of Information Security #ad - Current and relevant, such as the internet of Things, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, Cloud Computing, and DevOps. You review terms used in the field and a history of the discipline as you learn how to manage an information security program.

#ad



Cyberethics: Morality and Law in Cyberspace

#ad
Jones & Bartlett Learning #ad - The sixth edition includes interesting new case studies on social media, privacy, and the right to be forgotten, which encourages discussion and fosters critical thinking. This text is packaged with a full suite of instructor resources including a Test Bank, Lecture Slides in PowerPoint format, sample syllabi and additional resources.

New to the sixth edition:• new! -includes new case studies on modern issues such as the privacy and the right to be forgotten, learning analytics reporting tools, student practice activities and assessments, and Free Speech and Terrorism• EXPANDED! -Provides in-depth discussion of net neutrality and internet governance• NEW! - Considers the escalating encryption controversy involving the smartphone• UPDATED! - Provides a comprehensive look at the privacy and free speech issues arising from the expanded use of social networking• NEW! -Incorporates a new section on the challenge for intellectual property rights posed by digital books and eBooks• Includes Navigate 2 Advantage Access, which includes a comprehensive and interactive eBook, Employers Monitor Social Media and Twitter, and more Jones Bartlett Publishers.

Cyberethics: Morality and Law in Cyberspace #ad - Jones and Bartlett. Each new print copy includes navigate 2 Advantage Access that unlocks a complete eBook, homework and Assessment Center, Study Center, and a dashboard that reports actionable data. Written for the undergraduate course, cyberethics: morality and Law in Cyberspace, Sixth Edition provides a modern, comprehensive examination of the social costs and moral issues emerging from the ever-expanding use of the internet and new information technologies, as well as internet governance and its control by the state.

It highlights both the legal and philosophical perspective of content control, free speech, intellectual property, and security. Used book in Good Condition.

#ad



Hands-On Ethical Hacking and Network Defense

#ad
Cengage Learning #ad - Updated for today's cyber security environment, coverage of emerging vulnerabilities and innovative methods to protect networks, the Third Edition of this trusted text features new computer security resources, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.

The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. Does not contain an access card. Jones Bartlett Publishers. Jones and Bartlett. Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever.

Hands-On Ethical Hacking and Network Defense #ad - This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. Used book in Good Condition. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies.

#ad



Information Technology Project Management

#ad
Cengage Learning #ad - Develop a strong understanding of it project management as you learn to apply today's most effective project management tools and techniques with the unique approach found in Schwalbe's INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 9E. This edition reflects content from the latest PMBOK Guide, 6E and the Agile Practice Guide while providing a meaningful context.

Time-saving template files assist in completing tasks. Jones Bartlett Publishers. Examples from familiar companies featured in today's news discussion, exercises and cases reinforce learning. Jones and Bartlett. Agile information, a guide to using Microsoft Project 2016 and MindTap online resources will help you master today's most marketable IT project management skills.

Information Technology Project Management #ad - Used book in Good Condition. Examine the latest developments and skills as you prepare for the Project Management Professional PMP or Certified Associate in Project Management CAPM exams.

#ad



Standalone Book - CompTIA Security+ Guide to Network Security Fundamentals

#ad
Cengage Learning #ad - The text fully maps to the new compTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. Used book in Good Condition. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, attacks and defenses, the sixth edition includes expanded coverage of embedded device security, and new software tools to assess security.

Practical, blogs, videos, while the innovative information Security Community Site connects you to additional activities, Hands-On Projects and case activities help you put what you learn into real-world practice, and up-to-the-minute news and insights from the information security field. Jones and Bartlett.

Standalone Book - CompTIA Security+ Guide to Network Security Fundamentals #ad - Jones Bartlett Publishers. Reflecting the latest developments and emerging trends from the field, comptia securiTY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. Note: this book is a standalone book and will not include any access codes.

#ad



Guide To Computer Forensics and Investigations - Standalone Book

#ad
Cengage Learning #ad - Note: this book is a standalone book and will not include any access codes. It also explains how to use current forensics software and provides demo downloads. Jones and Bartlett. Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available.

It includes the most up-to-date coverage available of Linux and Macintosh, mobile devices, handheld devices, virtual machine software such as VMware and Virtual Box, email, Android, cloud forensics, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.

Guide To Computer Forensics and Investigations - Standalone Book #ad - Jones Bartlett Publishers. Used book in Good Condition. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court.

#ad



Management of Information Security

#ad
Cengage Learning #ad - You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification.

Jones and Bartlett. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things. Jones Bartlett Publishers. Used book in Good Condition. Management of information security, sixth edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies.

#ad



Auditing IT Infrastructures for Compliance Information Systems Security & Assurance

#ad
Jones & Bartlett Learning #ad - Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Jones and Bartlett. Jones Bartlett Publishers. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing.

About the series:this book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Based information systems and IT infrastructures compliance laws in both the public and private sector. Used book in Good Condition. Part of the jones& bartlett learning information system Security & Assurance Series!The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.

S. Authored by certified information Systems Security Professionals CISSPs, they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, but forward-thinking―putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, these books are not just current, as well.

Auditing IT Infrastructures for Compliance Information Systems Security & Assurance #ad - These titles deliver fundamental information-security principles packed with real-world applications and examples. Designed for courses and curriculums in it security, this series features a comprehensive, Information Assurance, Cybersecurity, and Information Systems Security, consistent treatment of the most current thinking and trends in this critical subject area.

#ad