Record Detail Back

XML

Introduction to Information Security


Organizations find information security and computer security require a lot of attention. As more and more of our lives and livelihoods become digital and interconnected, protecting that information naturally becomes more important. With increasing importance, these fields relate to a wider audience than the technical folks who manufacture, install, and manage computer resources. Technologists often, naturally, take a technology-centric approach to explaining security. There is so much technology that the reader or listener requires dedicated study to keep track of it all. This attention to detail in turn often leads students to miss the forest for the trees. Retaining the individual technologies’ details is difficult enough; the strategic importance of each technology, and how they interrelate, is often omitted or lost. This deficit is a problem for decision makers and leaders, since they need to know what capabilities can be deployed, but do not generally have the time to learn all the technology in detail. It is also a problem for students and young professionals who are technologists and operators, because they inefficiently use the tools they know.
978-1-59749-969-9
NONE
Information Technology
English
2014
1-359
LOADING LIST...
LOADING LIST...