Thursday, February 12, 2009

Discrete Mathematics or Information Assurance for the Enterprise

Discrete Mathematics

Author: Richard Johnsonbaugh

Focused on helping readers understand and construct proofs – and, generally, expanding their mathematical maturity – this best-seller is an accessible introduction to discrete mathematics. Takes an algorithmic approach that emphasizes problem-solving techniques. Expands discussion on how to construct proofs and treatment of problem solving. Increases number of examples and exercises throughout. 

Booknews

New edition of a time-tested text first published in 1984 in response to a need for a course that extended students' mathematical maturity and ability to deal with abstraction and included useful topics such as combinatorics, algorithms, and graphs. Intended for a one-or two- term introductory course, the text does not require knowledge of calculus, and there are no computer science prerequisites. Annotation c. by Book News, Inc., Portland, Or.



Look this: The Golden Text of AA or Pregnancy and Birth

Information Assurance for the Enterprise: A Roadmap to Information Security

Author: Corey Schou

Going beyond the technical coverage of computer and systems security measures, Information Assurance for the Enterprise provides readers an overarching model for information assurance for businesses, government agencies, and other enterprises needing to establish a comprehensive plan. All the components of security and how they relate are featured, and readers will also be shown how an effective security policy can be developed. Topics like asset identification, human factors, compliance with regulations, personnel security, risk assessment and ethical considerations are covered, as well as computer and network security tools and methods.
This is one of the only texts on the market that provides an up-to-date look at the whole range of security and IA topics. In post-9/11 times, managers and IT professionals need to address a wide range of security-related issues, and develop security systems that take all these diverse factors into account. As someone who has worked extensively with the U.S. State Department and other governmental agencies, Corey Schou is uniquely positioned to write the definitive book on the subject; and Daniel Shoemaker is a professor and consultant to the Department of Homeland Security in matters of Information Assurance policy.



Table of Contents:
Ch. 1Knowing what to secure1
Ch. 2Assessing risks25
Ch. 3Security policy57
Ch. 4Building and documenting an information assurance framework89
Ch. 5Maintaining security of operations113
Ch. 6Ensuring controlled access139
Ch. 7Personnel security175
Ch. 8Physical security205
Ch. 9Assuring against software vulnerabilities231
Ch. 10Continuity planning and disaster recovery257
Ch. 11Laws, regulations, and crime283
Ch. 12Network security basics : malware and attacks311
Ch. 13Cryptology339
Ch. 14Ensuring the secure use of software367
Ch. 15Human factors : ensuring secure performance393
Ch. 16Information ethics and codes and conduct419
App. AApache longbow AH-64D : target acquisition and display system (TADS) upgrade project441

No comments:

Post a Comment