Discrete Mathematics
Author: Richard Johnsonbaugh
Focused on helping readers understand and construct proofs – and, generally, expanding their mathematical maturity – this best-seller is an accessible introduction to discrete mathematics. Takes an algorithmic approach that emphasizes problem-solving techniques. Expands discussion on how to construct proofs and treatment of problem solving. Increases number of examples and exercises throughout.
Booknews
New edition of a time-tested text first published in 1984 in response to a need for a course that extended students' mathematical maturity and ability to deal with abstraction and included useful topics such as combinatorics, algorithms, and graphs. Intended for a one-or two- term introductory course, the text does not require knowledge of calculus, and there are no computer science prerequisites. Annotation c. by Book News, Inc., Portland, Or.
Look this: The Golden Text of AA or Pregnancy and Birth
Information Assurance for the Enterprise: A Roadmap to Information Security
Author: Corey Schou
Going beyond the technical coverage of computer and systems security measures, Information Assurance for the Enterprise provides readers an overarching model for information assurance for businesses, government agencies, and other enterprises needing to establish a comprehensive plan. All the components of security and how they relate are featured, and readers will also be shown how an effective security policy can be developed. Topics like asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations are covered, as well as computer and network security tools and methods.
This is one of the only texts on the market that provides an up-to-date look at the whole range of security and IA topics. In post-9/11 times, managers and IT professionals need to address a wide range of security-related issues, and develop security systems that take all these diverse factors into account. As someone who has worked extensively with the U.S. State Department and other governmental agencies, Corey Schou is uniquely positioned to write the definitive book on the subject; and Daniel Shoemaker is a professor and consultant to the Department of Homeland Security in matters of Information Assurance policy.
Table of Contents:
Ch. 1 | Knowing what to secure | 1 |
Ch. 2 | Assessing risks | 25 |
Ch. 3 | Security policy | 57 |
Ch. 4 | Building and documenting an information assurance framework | 89 |
Ch. 5 | Maintaining security of operations | 113 |
Ch. 6 | Ensuring controlled access | 139 |
Ch. 7 | Personnel security | 175 |
Ch. 8 | Physical security | 205 |
Ch. 9 | Assuring against software vulnerabilities | 231 |
Ch. 10 | Continuity planning and disaster recovery | 257 |
Ch. 11 | Laws, regulations, and crime | 283 |
Ch. 12 | Network security basics : malware and attacks | 311 |
Ch. 13 | Cryptology | 339 |
Ch. 14 | Ensuring the secure use of software | 367 |
Ch. 15 | Human factors : ensuring secure performance | 393 |
Ch. 16 | Information ethics and codes and conduct | 419 |
App. A | Apache longbow AH-64D : target acquisition and display system (TADS) upgrade project | 441 |
No comments:
Post a Comment