|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Michael G. Solomon , David Kim , Jeffrey L. CarrellPublisher: Jones and Bartlett Publishers, Inc Imprint: Jones and Bartlett Publishers, Inc Edition: 2nd New edition Dimensions: Width: 18.80cm , Height: 2.80cm , Length: 22.90cm Weight: 0.850kg ISBN: 9781284060140ISBN 10: 1284060144 Pages: 512 Publication Date: 22 August 2014 Audience: Professional and scholarly , Professional & Vocational Replaced By: 9781284200119 Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviewsAuthor InformationMichael G. Solomon, PhD, CISSP, PMP, CISM, CySA+, Pentest+, is an author, educator, and consultant focusing on privacy, security, blockchain, and identity management. As an IT professional and consultant since 1987, Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to more than 30 books and numerous training courses. Dr. Solomon is a Professor of Computer and Information Sciences at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University. David Kim is the president of Security Evolutions, Inc. (SEI; www.security-evolutions.com), located outside the Washington, DC, metropolitan area. SEI provides governance, risk, and compliance consulting services for public and private sector clients globally. SEI’s clients include healthcare institutions, banking institutions, governments, and international airports. SEI’s IT security consulting services include security risk assessments, vulnerability assessments, compliance audits, and designing of layered security solutions for enterprises. In addition, available services include developing business continuity and disaster recovery plans. Mr. Kim’s IT and IT security experience encompasses more than 30+ years of technical engineering, technical management, and sales and marketing management. This experience includes LAN/WAN, internetworking, enterprise network management, and IT security for voice, video, and data networking infrastructures. He is an accomplished author and part-time adjunct professor who enjoys teaching cybersecurity to students across the United States. Tab Content 6Author Website:Countries AvailableAll regions |