Information Security Science : Measuring the Vulnerability to Data Compromises 🔍
Young, Carl S
Syngress is an imprint of Elsevier, 1, PT, 2016
英语 [en] · PDF · 25.5MB · 2016 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
__Information Security Science: Measuring the Vulnerability to Data Compromises__ provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.
In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.
This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
* Specifies the analytic and scientific methods necessary to estimate the vulnerability to information loss for a spectrum of threats and attack vectors
* Represents a unique treatment of the nexus between physical and information security that includes risk analyses of IT device emanations, visible information, audible information, physical information assets, and virtualized IT environments
* Identifies metrics that point to the root cause of information technology risk and thereby assist security professionals in developing risk management strategies
* Analyzes numerous threat scenarios and specifies countermeasures based on derived quantitative metrics
* Provides chapter introductions and end-of-chapter summaries to enhance the reader’s experience and facilitate an appreciation for key concepts
In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.
This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
* Specifies the analytic and scientific methods necessary to estimate the vulnerability to information loss for a spectrum of threats and attack vectors
* Represents a unique treatment of the nexus between physical and information security that includes risk analyses of IT device emanations, visible information, audible information, physical information assets, and virtualized IT environments
* Identifies metrics that point to the root cause of information technology risk and thereby assist security professionals in developing risk management strategies
* Analyzes numerous threat scenarios and specifies countermeasures based on derived quantitative metrics
* Provides chapter introductions and end-of-chapter summaries to enhance the reader’s experience and facilitate an appreciation for key concepts
备用文件名
lgrsnf/K:\!genesis\!repository8\2\9780128096437.pdf
备用文件名
nexusstc/Information security science: measuring the vulnerability to data compromises/ebc10401918d857122212df18948d074.pdf
备用文件名
zlib/Business & Economics/Management & Leadership/Carl Young/Information Security Science. Measuring the Vulnerability to Data Compromises_2801002.pdf
备选作者
Carl S Young
备用出版商
Elsevier Science & Technology Books
备用出版商
Academic Press, Incorporated
备用出版商
Morgan Kaufmann Publishers
备用出版商
Brooks/Cole
备用版本
Amsterdam ; Boston ; Heidelberg ; London ; New York ; Oxford ; Paris ; San Diego ; San Francisco ; Singapore ; Sydney ; Tokyo, 2016
备用版本
Place of publication not identified, 2016
备用版本
United States, United States of America
备用版本
Elsevier Ltd., Amsterdam, 2016
备用版本
Cambridge, MA, 2016
元数据中的注释
lg1578400
元数据中的注释
{"edition":"1","isbns":["0128096438","9780128096437"],"last_page":406,"publisher":"Syngress"}
备用描述
Content:
Front matter,Copyright,Dedication,Biography,Foreword,Preface,AcknowledgmentsEntitled to full textPart I: Threats, risk and risk assessmentsChapter 1 - Information Security Threats and Risk, Pages 3-27
Chapter 2 - Modeling Information Security Risk, Pages 29-52
Chapter 3 - Physics and Information Security, Pages 55-75
Chapter 4 - Electromagnetic Waves, Pages 77-102
Chapter 5 - Noise, Interference, and Emanations, Pages 103-122
Chapter 6 - Signals and Information Security, Pages 125-157
Chapter 7 - The Compromise of Electromagnetic Signals, Pages 159-184
Chapter 8 - Countermeasures to Electromagnetic Signal Compromises, Pages 185-202
Chapter 9 - Visual Information Security, Pages 203-217
Chapter 10 - Audible Information Security, Pages 219-247
Chapter 11 - Information Technology Risk Factors, Pages 251-261
Chapter 12 - Information Technology Risk Measurements and Metrics, Pages 263-285
Chapter 13 - Special Information Technology Risk Measurements and Metrics, Pages 287-314
Chapter 14 - Physical Security Controls, Pages 317-338
Chapter 15 - Data Centers: A Concentration of Information Security Risk, Pages 339-357
Epilogue, Pages 359-360
Appendix A - The Divergence and Curl Operators, Pages 361-363
Appendix B - Common Units of Electricity and Magnetism, Page 365
Appendix C - Capacitive and Inductive Coupling in Circuits, Pages 367-369
Appendix D - Intermediate Frequency (IF) Filtering of Signals, Pages 371-372
Appendix E - An Indicative Table of Contents for an Information Security Policy, Pages 373-376
Index, Pages 377-385
Front matter,Copyright,Dedication,Biography,Foreword,Preface,AcknowledgmentsEntitled to full textPart I: Threats, risk and risk assessmentsChapter 1 - Information Security Threats and Risk, Pages 3-27
Chapter 2 - Modeling Information Security Risk, Pages 29-52
Chapter 3 - Physics and Information Security, Pages 55-75
Chapter 4 - Electromagnetic Waves, Pages 77-102
Chapter 5 - Noise, Interference, and Emanations, Pages 103-122
Chapter 6 - Signals and Information Security, Pages 125-157
Chapter 7 - The Compromise of Electromagnetic Signals, Pages 159-184
Chapter 8 - Countermeasures to Electromagnetic Signal Compromises, Pages 185-202
Chapter 9 - Visual Information Security, Pages 203-217
Chapter 10 - Audible Information Security, Pages 219-247
Chapter 11 - Information Technology Risk Factors, Pages 251-261
Chapter 12 - Information Technology Risk Measurements and Metrics, Pages 263-285
Chapter 13 - Special Information Technology Risk Measurements and Metrics, Pages 287-314
Chapter 14 - Physical Security Controls, Pages 317-338
Chapter 15 - Data Centers: A Concentration of Information Security Risk, Pages 339-357
Epilogue, Pages 359-360
Appendix A - The Divergence and Curl Operators, Pages 361-363
Appendix B - Common Units of Electricity and Magnetism, Page 365
Appendix C - Capacitive and Inductive Coupling in Circuits, Pages 367-369
Appendix D - Intermediate Frequency (IF) Filtering of Signals, Pages 371-372
Appendix E - An Indicative Table of Contents for an Information Security Policy, Pages 373-376
Index, Pages 377-385
备用描述
Provides the scientific background, analytic methods, and quantitative metrics to allow scientists and engineers with no background in security to estimate vulnerability to a spectrum of information security threats. Explores the physical nature of information security risk, and in so doing exposes connections between information security, physical security, information technology, and information theory
开源日期
2016-11-18
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.