Skip to content

21st century the college IT security professional planning materials: Information Systems Security(Chinese Edition) by LIN GUO YUAN . BIE YU YU . LIU KAI

by LIN GUO YUAN . BIE YU YU . LIU KAI

No image available

21st century the college IT security professional planning materials: Information Systems Security(Chinese Edition)

by LIN GUO YUAN . BIE YU YU . LIU KAI

  • New
paperback. New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: December 2012 Pages: 229 Language: Chinese in Publisher: Tsinghua University Press. the college IT security in the 21st century professional planning textbook: information systems security elaborate information system planning. design and implementation of the security issues involved in the process . Explore three levels based on the hardware. software. personnel. introduce relevant models and concepts based on the planning. requirements and testing of physical device security. environmental security requirements and communications hardware security information systems security engineering. information system data software security. information systems in use in the survival of their own security issues. as well as the safety of the personnel of the use of information systems management and control. 21st century the colleges information security professional planning textbook: information system security related to information systems security risk assessment and mitigation. and safety standards and norms. emergency response and recovery. security technology and security solutions necessary introduction. 21st century the colleges information security professional planning textbook: information system security as computers. software engineering. information security. Internet of Things engineering professional materials are also available IT learning reference. The 1.2.3 information systems development of the concept of the concept of the nature of the meaning of Contents: Chapter 1 Overview 1.1 Information 1.1.1 Information 1.1.2 1.2 System 1.2.1 System 1.2.2 Information Systems 1.2.4 information systems function 1.3 the concept of information system security 1.3.1 Information Systems Security 1.3.2 Information Systems Security Research 1.3.3 Information Security and Information Systems Security 1.4 Chapter Summary 1.5 Exercises Chapter 2 Information Systems Security Engineering the ISSE and cycle model 2.1 ISSE Overview 2.1 .1 ISSE basic concepts 2.1.2 ISSE the connotation 2.2 Information systems security engineering life cycle 2.3 ISSE process 2.3.1 explore information security requirements 2.3.2 2.3.3 design information protection system determine the demand for information assurance information security system 2.3.4 2.3.5 assessment information protection system 2.4 ISSE basic functions of the 2.4.1 security planning. control and ISSE team formation 2.4.6 Security Risk Management 2.4.2 Security Requirements 2.4.3 safe operation of the safety design 2.4.4 2.4.5 Life cycle security 2.5 Chapter Summary 2.6 Exercises Chapter 3 Information Systems Security Overview 3.1.1 Information Systems Security Planning Planning 3.1 information system security planning concept 3.1.2 Information Systems Security planning goals 3.1.3 Information Systems Security planning principles 3.1.4 Information System 3.1.5 security planning information system security planning steps 3.2 information system security planning content 3.2.1 computing model security planning 3.2.2 information resources security planning 3.2.3 network and system security planning 3.2.4 Security Organization and Management Planning 3.3 Information Systems Security Planning Models and Methods 3.3.1 security planning model 3.3.2 security planning methods 3.4 Chapter Summary 3.5 Exercises Chapter 4 Information systems security needs 4.1 security requirements outlined different levels of security requirements of 4.1.1 security needs sources 4.1.2 4.2 Security requirements analysis 4.2.3 Overview 4.2.1 Analysis of the security needs of the general issues covered 4.2.2 security needs analysis. security requirements analysis methods 4.2.4 security needs description 4.3 security classification 4.3.1 operating system security requirements demand 4.3 .2 database security needs ... Chapter 5 Chapter 6 of the security of information systems design information system security testing security management in Chapter 7 Information System Operators Chapter 8 Chapter 9 of the Information Systems Security Risk Assessment Information System Security example References Satisfaction guaranteed,or money back.