Welcome to Bucaro TecHelp!

Bucaro TecHelp
Maintain Your Computer and Use it More Effectively
to Design a Web Site and Make Money on the Web

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

Each year 1.5 million shelter animals are euthanized (670,000 dogs and 860,000 cats). Source: ASPCA. The solution is not to shelter unwanted pets, but to SHUT DOWN THE PET MILLS. Anyone who wants a pet will just have to adapt a great pet from a shelter.

Elementary Information Security

Elementary Information Security is certified to comply fully with the NSTISSI 4011: the federal training standard for information security professionals Comprehensive and accessible, It covers the entire range of topics required for US government courseware certification NSTISSI 4011 and urges students to analyze a variety of security problems while gaining experience with basic tools of the trade.

Written for the one-term undergraduate course, the text emphasizes both the technical and non-technical aspects of information security and uses practical examples and real-world assessment tools. Early chapters in the text discuss individual computers and small LANS, while later chapters deal with distributed site security and the Internet.

Cryptographic topics follow the same progression, starting on a single computer and evolving to Internet-level connectivity. Mathematical concepts throughout the text are defined and tutorials with mathematical tools are provided to ensure students grasp the information at hand.

Rather than emphasizing memorization, this text challenges students to learn how to analyze a variety of security problems and gain experience with the basic tools of this growing trade.

Key Features:

Covers all topics required by the US government curriculum standard NSTISSI 4011.
Provides students with tutorials and practice with mathematical tools.
Problem Definitions describe a practical situation that includes a security dilemma.
Technology Introductions provide a practical explanation of security technology to be used in the specific chapters.
Implementation Examples show the technology being used to enforce the security policy at hand.
Residual Risks describe the limitations to the technology and illustrate various tasks against it.
Each chapter includes worked examples of techniques students will need to be successful in the course.
Includes examples of how to calculate the number of attempts needed to crack secret information.
Instructor resources include an Instructor's Manual, PowerPoint Lecture outlines, and a complete Test Bank.

Reader reshad says,"The book is a bit heavy as it has lots of pages. But, very informative. The author didn't put just examples, and his ideas much on the book, but the real facts, and training that you need for Information Security. Good book, and will keep it for my feature references." Click here for more information.

More Network Security Articles:
• NMAP (Network Mapper) Port Scanner
• Methods to Combat Distributed Denial of Service (DDoS) Attacks
• Difference Between Rule and Role Based Access Control
• Designing Physical Network Security
• Cyber Security Tips for Small and Medium Business (SMB)
• Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
• Secure, Network Compliant BYOD (Bring Your Own Device) Solutions
• What Roles Do Firewalls and Proxy Servers Play in Network Security?
• How SSL (Secure Sockets Layer) Works
• Digital Signatures and Certificates

RSS Feed RSS Feed

Follow Stephen Bucaro Follow @Stephen Bucaro

Computer Networking Sections

Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2018 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268