Lab Manual To Accompany Access Control Authentication And Public Key Infrastructure

Download Lab Manual To Accompany Access Control Authentication And Public Key Infrastructure PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Lab Manual To Accompany Access Control Authentication And Public Key Infrastructure book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Lab Manual to Accompany Access Control, Authentication, and Public Key Infrastructure

The Laboratory Manual to Accompany Access Control, Authentication, and Public Key Infrastructure is the lab companion to the Information Systems and Security Series title, Auditing IT Infrastructure for Compliance. It provides hands-on exercises, each with measurable learning outcomes.About the SeriesVisit www.issaseries.com for a complete look at the series!The Jones & Bartlett Learning Information System & Assurance Series delivers fundamental IT security principles packed with real-world applications and examples for IT Security, Cybersecurity, Information Assurance, and Information Systems Security programs. Authored by Certified Information Systems Security Professionals (CISSPs), and reviewed by leading technical experts in the field, these books are current, forward-thinking resources that enable readers to solve the cybersecurity challenges of today and tomorrow.
Access Control, Authentication, and Public Key Infrastructure

Author: Bill Ballad
language: en
Publisher: Jones & Bartlett Publishers
Release Date: 2010-10-22
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. The first part of Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access contol programs. It then looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. The final part is a resource for students and professionals which disucsses putting access control systems to work as well as testing and managing them.