|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Mark Ciampa (Western Kentucky University)Publisher: Cengage Learning, Inc Imprint: Course Technology Inc Edition: 5th edition Dimensions: Width: 18.70cm , Height: 3.60cm , Length: 23.10cm Weight: 1.180kg ISBN: 9781305093911ISBN 10: 1305093917 Pages: 608 Publication Date: 05 August 2014 Audience: College/higher education , Tertiary & Higher Education Replaced By: 9781337288781 Format: Mixed media product Publisher's Status: Active Availability: Not yet available ![]() This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of ContentsReviewsI was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent. Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to. I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent. I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent. Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to. I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent. Author InformationDr. Mark Ciampa is a professor of information systems in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this current role, he served as an associate professor and the director of academic computing at Volunteer State Community College in Gallatin, Tennessee, for 20 years. Dr. Ciampa has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published more than 20 articles in peer-reviewed journals and has written more than 25 technology textbooks, including CompTIA CySA+ Guide to Cybersecurity Analyst, Security+ Guide to Network Security Fundamentals, Security Awareness: Applying Practical Security in Your World, CWNA Guide to Wireless LANS, and Guide to Wireless Communications. Dr. Ciampa holds a Ph.D. in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare. Tab Content 6Author Website:Countries AvailableAll regions |