£37.99
FREE Delivery in the UK.
Temporarily out of stock.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we dispatch the item.
Dispatched from and sold by Amazon.
Gift-wrap available.
Quantity:1
Guide to the Homeland Sec... has been added to your Basket
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Guide to the Homeland Security Body of Knowledge in Information Assurance Paperback – 16 Jun 2011


See all formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
£37.99
£24.87 £25.02
£37.99 FREE Delivery in the UK. Temporarily out of stock. Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we dispatch the item. Dispatched from and sold by Amazon. Gift-wrap available.


Product details


More About the Authors

Discover books, learn about writers, and more.

Product Description

Review

Section I: BACKGROUND. 1. The Field of Cyber Security. 2. The DHS EBK Initiative. 3. Applying the EBK. Section II: EBK ROLES AND REQUIRED CAPABILITIES. 4. The Executive role. 5. The Functional role. 6. The Corollary role. Section II: THE 14 AREAS OF INFORMATION SECURITY. 7. Data Security. 8. Digital Forensics. 9. Enterprise Continuity. 10. Incident Management. 11. IT Security Training and Awareness. 12. IT Systems Operations and Maintenance. 13. Network and Telecommunications Security. 14. Personnel Security. 15. Physical and Environmental Security. 16. Procurement. 17. Regulatory and Standards Compliance. 18. Security Risk Management. 19. Strategic Security Management. 20. System and Application Security.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on Amazon.co.uk.
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 5 reviews
1 of 1 people found the following review helpful
Reptitive and Lots of Fluff 7 May 2014
By D. Engel - Published on Amazon.com
Format: Kindle Edition Verified Purchase
I read this book nearly word for word and I had a hard time pushing myself through it to complete it. I felt that there was a massive amount of repetition and lots of fluff. Instead of just hitting the topics and moving on I felt that we had to repeat concepts of previous chapters to understand the current point. There are very valuable points presented however, hence the three stars, but I don't feel they are presented well. The fact that the reading was so tedious I had to deduct two stars. I am not an author and writing is a weakness of mine but I am certain there must be a better way to make the topics flow better. If you want to get a solid definition and description of the EBK this may be the book for you. I should add that maybe my review is tainted after having read The Code Book, by Simon Singh. It's not an apples to apples comparison, however, but the fact that it's non-fiction and doesn't read like a text book makes for a very pleasant read.
Exactly what I needed. 23 April 2014
By Durward Ferland - Published on Amazon.com
Format: Paperback Verified Purchase
This book gave me the exact information I needed when researching Cybersecurity. It is intended to be used in a classroom setting; however, I learned a lot out of just reading through the parts that covered what I was hoping to learn more about. It also includes a story that runs throughout the chapters to make the reading more interesting. It's a scary world out there!
cyber 8 April 2015
By Maggie - Published on Amazon.com
Format: Paperback Verified Purchase
Great info from different points of view of the user.
1 of 4 people found the following review helpful
Good Source for EBK 24 Nov. 2012
By whohoo - Published on Amazon.com
Format: Paperback Verified Purchase
Bought this book because it was the assigned text for a graduate class. It was easy to read. Explained the role of EBK n IA in a coear and concise manner. I would recommend thi book as a resource to anyone who wants to learn more about EBK or IA fameworks.
8 of 20 people found the following review helpful
more technically lightweight nonsense 2 Sept. 2012
By Bruce D. Wilner - Published on Amazon.com
Format: Paperback
I have little to say other than that--as a contribution to the field--the book constitutes more technically lightweight nonsense, but Amazon demands twenty words of me.

I assign two stars because the author has done a workmanlike job of factoring modern (if less than agile) data/security/regulatory administration roles into workable sets that somehow mirror the organization of tools and operative interfaces in modern desktop operating systems (if you can call a point-and-click interface that strongly discourages one from straying one iota from ultra-standard configuration--and that operates atop an infrastructure that, after fifteen years' worth of maturation, has yet precisely to delineate its own discretionary access control algorithm ["I can perform operation O upon container C iff rules R apply"]--an "operating system"). I apologize for the rather tortuous structure of that sentence, but torturous computer systems can lead to tortuous criticisms. But all this talk of torture is making me thirsty.

I'm back again. (That red grapefruit juice was delicious.) I should also state categorically that I find it frightening--nay, terrifying--that the lion's share of (if not all) books that purport to analyze cybersecurity and cyberwarfare and cyber* (adopting Markovian regular expression notation for the reader's convenience) have little to say of any practical value--other than ho-hum NMAP and PORTSCAN and such foolishness, scarcely more advanced than SATAN (indeed--one can argue--far _less_ advanced than SATAN), typically rudely strung together with the odd few lines of Perl or awk or what-have-you.
Were these reviews helpful? Let us know


Feedback