

Paperback: 214 pages
Publisher: Jones & Bartlett Learning; 1 edition (May 12, 2006)
Language: English
ISBN-10: 0763738190
ISBN-13: 978-0763738198
Product Dimensions: 6 x 0.5 x 8.9 inches
Shipping Weight: 8 ounces (View shipping rates and policies)
Average Customer Review: 4.0 out of 5 stars See all reviews (2 customer reviews)
Best Sellers Rank: #830,858 in Books (See Top 100 in Books) #200 in Books > Computers & Technology > Certification > CompTIA #728 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #1037 in Books > Textbooks > Computer Science > Networking

Just finished consuming this supplemental text of cases for a Information Security course I am taking at a rural university in Kansas.From the first previous review:"The case studies presented in this book describe examples of information security problems faced by real organizations. They are analyzed in depth and each one covers a different area. There are seven case studies in all and they are:*) Kraft Foods Inc.: Protecting Employee Data*) Advo Inc.: Integrating IT and Physical Security*) Yale New Haven Center For Emergency Preparedness and Disaster Response: Contingency Planning*) IBM: The Embedded Security Subsystem*) SRA International, Inc.: Automating Compliance with Federal Information Security Requirements*) FBI New Haven Field Office - A Computer Analysis and Response Team: Tracking a Computer Intruder*) Aetna: Developing and Implementing a Successful Information Security Awareness Program"My review starts here.I give this at least 3 stars, which I think is good to very good. The material is a very good high level overview of Information Security terminology and the cases reflect what I have experienced working with industry and government over the last few decades. You will notice a little regional slant to the northeast area of the United States. The case study of Yale New Haven Center seems to add more 'related information' to Infosec.Case studies in general are used in many well known graduate studies courses, this text is very appropriate to the enhancement of knowledge in the infosec educational process, case study method.
I love when I don't get tricked into buying an international edition :D Thanks! Came on time and everything!
Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Information Security: Contemporary Cases Contemporary Drug Information: An Evidence-Based Approach (Gaenelein, Contemporary Drug Information) Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust) Security Risk Management: Building an Information Security Risk Management Program from the Ground Up Managing Risk In Information Systems (Information Systems Security & Assurance) The United States v. Nixon: The Watergate Scandal and Limits to US Presidential Power (Landmark Supreme Court Cases) (Landmark Supreme Court Cases (Abdo)) Cases on Information Technology And Business Process Reengineering Healthcare Information Management Systems: Cases, Strategies, and Solutions (Health Informatics) Corporate Information Strategy and Management: Text and Cases Information Systems for Managers: Text and Cases Hacking: Computer Hacking:The Essential Hacking Guide for Beginners, Everything You need to know about Hacking, Computer Hacking, and Security ... Bugs, Security Breach, how to hack) CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption Programmer's Ultimate Security DeskRef: Your programming security encyclopedia Security Analysis: Sixth Edition, Foreword by Warren Buffett (Security Analysis Prior Editions) 6 Months to 6 Figure Passive Income: Anyone Can Do It - Guide to Guaranteed Financial Security .. Make Money While You Sleep (Personal Financial Security) Security Risk Assessment: Managing Physical and Operational Security The Myths of Security: What the Computer Security Industry Doesn't Want You to Know Dynamic Networks and Cyber-Security: 1 (Security Science and Technology)