Information Security Science: Measuring the Vulnerability to Data Compromises
Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA),Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA),Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA),Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA)
Information Security Science: Measuring the Vulnerability to Data Compromises
Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA),Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA),Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA),Carl Young (Managing Director and Chief Security Officer, Stroz Friedberg and Adjunct Professor, John Jay College, City University of New York, NY, USA)
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals.
In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation.
This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
This item is not currently in-stock. It can be ordered online and is expected to ship in approx 2 weeks
Our stock data is updated periodically, and availability may change throughout the day for in-demand items. Please call the relevant shop for the most current stock information. Prices are subject to change without notice.
Sign in or become a Readings Member to add this title to a wishlist.