Get Free Shipping on orders over $79
Information Security Science : Measuring the Vulnerability to Data Compromises - Carl Young
eTextbook alternate format product

Instant online reading.
Don't wait for delivery!

Go digital and save!

Information Security Science

Measuring the Vulnerability to Data Compromises

By: Carl Young

Paperback | 21 June 2016 | Edition Number 1

At a Glance

Paperback


RRP $109.95

$99.75

or 4 interest-free payments of $24.94 with

 or 

Ships in 5 to 7 business days

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.

In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.

This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

  • Specifies the analytic and scientific methods necessary to estimate the vulnerability to information loss for a spectrum of threats and attack vectors
  • Represents a unique treatment of the nexus between physical and information security that includes risk analyses of IT device emanations, visible information, audible information, physical information assets, and virtualized IT environments
  • Identifies metrics that point to the root cause of information technology risk and thereby assist security professionals in developing risk management strategies
  • Analyzes numerous threat scenarios and specifies countermeasures based on derived quantitative metrics
  • Provides chapter introductions and end-of-chapter summaries to enhance the reader's experience and facilitate an appreciation for key concepts

More in Technology in General

The C Programming Language : Prentice Hall Software - Brian Kernighan

RRP $107.04

$77.75

27%
OFF
Once Upon a Time in Space - James Bluemel

RRP $65.00

$48.99

25%
OFF
First Knowledges Innovation : Knowledge and Ingenuity - Ian J McNiven
Thing Explainer : Complicated Stuff in Simple Words - Randall Munroe
The Design of Everyday Things : Revised and Expanded Edition - Don Norman
Burn Book - Kara Swisher

Paperback

RRP $34.99

$28.75

18%
OFF
Sketching the Basics : Drawing Techniques for Product Designers - Koos Eissen
iPhone For Dummies, 2026 Edition : iPhone for Dummies - Guy Hart-Davis
Longitude - Dava Sobel

Paperback

RRP $22.99

$20.75

10%
OFF
Exactly : How Precision Engineers Created the Modern World - Simon Winchester
Gilded Rage : Elon Musk and the Radicalization of Silicon Valley - Jacob Silverman
How a Game Lives - Jacob Geller

$51.75

Wood in Australia : Types, Properties and Uses - Keith R. Bootle

RRP $82.95

$59.99

28%
OFF
Modern Engineering Mathematics : 6th Edition - Glyn James

RRP $145.90

$117.75

19%
OFF