Tag Archives: information security

New title for Communication and Information Engineering

Information security analytics: finding security insights, patterns, and anomalies in big data
By Mark Talabis.
E Book, Online

Synopsis:
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.
Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.[As taken from Amazon]

New title for Communication and Information Engineering

Information assurance handbook : effective computer security and risk management strategies
By Corey Schou, Steven Hernandez.
TK5105.59.S376, Lee Wee Nam Library

Synopsis:

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems
[As taken from Amazon]

New title for Communication and Information Engineering

Security policies and implementation issues
By Rob Johnson.
QA76.9.A25J68 2015, Lee Wee Nam Library

Synopsis:

The book offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by an industry expert, it presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. [As taken from Amazon]

New title for Communication and Information Engineering

Building an information security awareness program : defending against social engineering and technical threats
By Bill Gardner, Valerie Thomas.
TK5102.85.G226, Lee Wee Nam Library

Synopsis:

Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. [As taken from Amazon]

New title for Communication and Information Engineering

Introduction to information security : a strategic-based approach
By Shimeall,Timoth.
TK5102.85.S556, Lee Wee Nam Library
Synopsis:
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. [As taken from Amazon]