Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Information security science: measuring the vulnerability to data compromises
Bookmark Share

Text

Information security science: measuring the vulnerability to data compromises

Young, Carl S. - Personal Name;

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.
In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.
This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Table of Contents
Part I: Threats, risk and risk assessments
Chapter 1: Information Security Threats and Risk
Chapter 2: Modeling Information Security Risk

Part II: Scientific fundamentals
Chapter 3: Physics and Information Security
Chapter 4: Electromagnetic Waves
Chapter 5: Noise, Interference, and Emanations

Part III: The compromise of signals
Chapter 6: Signals and Information Security
Chapter 7: The Compromise of Electromagnetic Signals
Chapter 8: Countermeasures to Electromagnetic Signal Compromises
Chapter 9: Visual Information Security
Chapter 10: Audible Information Security

Part IV: Information technology risk
Chapter 11: Information Technology Risk Factors
Chapter 12: Information Technology Risk Measurements and Metrics
Chapter 13: Special Information Technology Risk Measurements and Metrics

Part V: The physical security of information assets
Chapter 14: Physical Security Controls
Chapter 15: Data Centers: A Concentration of Information Security Risk
Appendix A: The Divergence and Curl Operators
Appendix B: Common Units of Electricity and Magnetism
Appendix C: Capacitive and Inductive Coupling in Circuits
Appendix D: Intermediate Frequency (IF) Filtering of Signals
Appendix E: An Indicative Table of Contents for an Information Security Policy
Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 YOU i
b0002310
Available
Detail Information
Series Title
--
Call Number
005.8 YOU i
Publisher
Cambridge : Syngress., 2016
Collation
xx, 385 hm.; ilus.; 23 cm
Language
English
ISBN/ISSN
9780128096437
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Computer security
Specific Detail Info
--
Statement of Responsibility
Carl S. Young
Other Information
Link
-
Daftar Isi
-
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?