Apress NBA

Information Assurance

Security in the Information Environment

By Andrew Blyth , Gerald L. Kovacich

  • eBook Price: $119.00
Buy eBook Buy Print Book

Information Assurance Cover Image

  • Add to Wishlist
  • ISBN13: 978-1-8462-8266-9
  • 280 Pages
  • User Level: Professionals
  • Publication Date: July 19, 2006
  • Available eBook Formats: PDF
Full Description
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare, it re-examines why organisations need to take information assurance seriously, and discusses the business, legal, and technical knowledge needed to secure these vital government and business assets. Key topics include: The role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; International standards, policies and security acts. 'A refreshingly clear & wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised.' (Dr. Andy Jones, Research Group Leader, BT Group Chief Technology Office UK)
Table of Contents

Table of Contents

  1. An Introduction to Information Assurance.
  2. What is Information Assurance?
  3. The World of Information.
  4. The Theory of Risks.
  5. The Information World of Crime.
  6. IA Trust and Supply Chains.
  7. Basic IA Concepts and Models.
  8. The Role of Policy in Information Assurance.
  9. IA in the World of Corporations.
  10. the Corporate Security Officer.
  11. Corporate Security Functions.
  12. IA in the Interest of National Security.
  13. The Coporate IA Officer.
  14. IA Organisational Functions.
  15. Incident Management and Response.
  16. Technical Aspects of IA.
  17. IA and Software.
  18. Applying Cryptography to IA.
  19. Information Technology Security.
  20. Security Standards.
  21. The Future.
  22. The Future and Final Thoughts.
  23. Appendices.

If you think that you've found an error in this book, please let us know by emailing to editorial@apress.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed.
No errata are currently published


    1. PHP Objects, Patterns, and Practice


      View Book

    2. Beginning Android 3D Game Development


      View Book

    3. Troubleshooting Oracle Performance


      View Book

    4. Beginning Amazon Web Services with Node.js


      View Book