Search  for anything...

Fundamentals Of Information Systems Security (Information Systems Security & Assurance) - Standalone book (Jones & Bartlett Learning Information Systems Security & Assurance)

  • Based on 53 reviews
Condition: New
Checking for product changes
$22.50 Why this price?
Save $77.45 was $99.95

Buy Now, Pay Later


As low as $5 / mo
  • – 4-month term
  • – No impact on credit
  • – Instant approval decision
  • – Secure and straightforward checkout

Ready to go? Add this product to your cart and select a plan during checkout. Payment plans are offered through our trusted finance partners Klarna, PayTomorrow, Affirm, Afterpay, Apple Pay, and PayPal. No-credit-needed leasing options through Acima may also be available at checkout.

Learn more about financing & leasing here.

Free shipping on this product

30-day refund/replacement

To qualify for a full refund, items must be returned in their original, unused condition. If an item is returned in a used, damaged, or materially different state, you may be granted a partial refund.

To initiate a return, please visit our Returns Center.

View our full returns policy here.


Availability: Only 1 left in stock, order soon!
Fulfilled by Amazon

Arrives Wednesday, Apr 9
Order within 12 hours and 13 minutes
Available payment plans shown during checkout

Description

NOTE: This book is standalone book PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part 2 is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The book closes with a resource for readers who desire additional material on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. New to the Second Edition: - New material on cloud computing, risk analysis, IP mobility, OMNIBus, and Agile Software Development. - Includes the most recent updates in Information Systems Security laws, certificates, standards, amendments, and the proposed Federal Information Security Amendments Act of 2013 and HITECH Act. - Provides new cases and examples pulled from real-world scenarios. - Updated data, tables, and sidebars provide the most current information in the field. Read more

Publisher ‏ : ‎ Jones & Bartlett Learning; 2nd edition (July 25, 2013)


Language ‏ : ‎ English


Paperback ‏ : ‎ 544 pages


ISBN-10 ‏ : ‎ 1284031624


ISBN-13 ‏ : ‎ 21


Item Weight ‏ : ‎ 2.05 pounds


Dimensions ‏ : ‎ 7.75 x 1.25 x 9.5 inches


Best Sellers Rank: #2,026,632 in Books (See Top 100 in Books) #732 in Computer Networking (Books) #1,588 in Computer Network Security


#732 in Computer Networking (Books):


#1,588 in Computer Network Security:


Frequently asked questions

If you place your order now, the estimated arrival date for this product is: Wednesday, Apr 9

Yes, absolutely! You may return this product for a full refund within 30 days of receiving it.

To initiate a return, please visit our Returns Center.

View our full returns policy here.

  • Klarna Financing
  • Affirm Pay in 4
  • Affirm Financing
  • Afterpay Financing
  • PayTomorrow Financing
  • Financing through Apple Pay
Leasing options through Acima may also be available during checkout.

Learn more about financing & leasing here.

Top Amazon Reviews


  • Great book, wish it was in kindle
Great book, wish it was in kindle. I got the book used and it came in good condition. For a new one it is 100 bucks that is a little too much, and i would only spent that if this was the only book I were going to use, but it is not. I am happy with the book, and it helps me with my security classes as a reference. ... show more
Reviewed in the United States on October 25, 2017 by Ralph the Great

  • The professor seemed to think that this was the best place to get all his info form
Used it in a masters program. The professor seemed to think that this was the best place to get all his info form; not from the textbook that was defined for the class. Once I got this, exams and homework was much easier!!
Reviewed in the United States on August 26, 2015 by Randy Plotkin

  • Good review, but maybe outdated already?
This is a solid recap of all categories of INFOSEC but the book feels antiquated at points. You'll find mentions of "PDAs" when talking about client devices, and the chapter on telecom focuses primarily on legacy telephone systems that are less-than-common in modern business. That is not to the detriment of the book as a whole, but it does make me wonder how current this book is. ... show more
Reviewed in the United States on September 30, 2016 by PH

  • Speedy Delivery
I added a class at the last minute and ordered this book on a Tuesday and it was received on Friday. My class started on Monday. I didn't have to worry about falling behind.
Reviewed in the United States on July 21, 2014 by C. Price

  • Very Fundamental
I purchased this book for a class in information security. From the perspective of the class this book filled the bill and was helpful and useful. From the perspective of overall information security this book is somewhat lacking. It focuses on the security inside a system, not network/internet wide security. Although it states what it says are requirements for a WAN it really looks at that from the perspective a multilayer LAN. Macro infrastructure is not included in the list of domains covered by this view of Information Systems Security. I am certain this comes from the (ISC)2 construct of IS. It fails to address the security requirements or the vulnerabilities associated with Network Management Systems and the associated supervisory control and data acquisition (SCADA) systems. Without a holistic view of all levels of required security this book leaves the student lacking a key part of the entire security picture. Long standing physical vulnerabilities to IS infrastructure persist. The IT professional should be made aware of them since they are in the best position to advocate for improvement and risk reduction or mitigation. This book does not provide the background information for that. ... show more
Reviewed in the United States on May 11, 2015 by captiii

  • Great way to start if you are interested in learning ...
Great way to start if you are interested in learning about computer security. Good quality Amazon rental is pretty dope.
Reviewed in the United States on February 28, 2016 by WINDSERBLUE

  • How an order should be!
Fits as described and arrived when expected. Would definetly order again. Thanks for a great order.
Reviewed in the United States on September 2, 2015 by Kisha

  • Not Edible?
The edibility of this item is not up to my normal standards but it served well with a side of ink from handful of BIC pens. But overall it was a good eat.
Reviewed in the United States on February 17, 2016 by DeadNexus

Can't find a product?

Find it on Amazon first, then paste the link below.