This is a standalone book and does not include virtual labs access. Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. -Maps fully to the six major domains of the CompTIA Security+ SYO-401 Certification exam -Updated to include coverage on recent compliance law and standards updates, including FISMA, NIST SP800-171, and PCI DSS v3.2 -New content on advanced malware and APT attacks to the end points such as ransomware and crypto locker -Addresses data breach and data breach incident response planning -Introduces recent "Internet of Things" risk threats and privacy issues -Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn
This book would have been really interesting, if I knew what I was reading. We have gotten to the point in my major where I'll get more from reading Spanish. Heaven help me.
It is a concise overview of fundamental knowledge relating to the terminologies and proper handling regarding compromise data and how to mitigate these risks. It also includes the need of organization to develop proper policies in order to make the flow of the transactions smoothly as possible. It explains cryptography, several types of malicious attacks and how hackers infiltrate the system using different methods. This book my Kim and Solomon are best for student and professionals who want to have a background regarding information security.
Overall, I thought this was a good textbook. I was already familiar with many of the topics it covered, but I still learned and solidified some knowledge as I read. It was mandatory reading for college, but not the kind of mandatory reading that you have to drag yourself to read.
This was my first foray into ISEC so I don't have much to compare this book to. Still if this had not been assigned for my information security class I don't think I would have picked this book up. Seems a little bit out of date, and not quite as well organized as some of my other textbooks.