从1977年到2012年,我们看到了围绕信息安全主题进行的大量研究。 与信息安全研究相比,信息系统研究如何进行? 我们的研究旨在就主题,理论和使用的方法对过去35年的信息系统(IS)和信息安全(InfoSec)研究进行比较。 我们分析了23种不同期刊和会议的1,588篇论文。 我们发现安全研究受到了IS和InfoSec研究人员的高度关注。 尽管在这两个学科中都对大多数安全主题进行了同样的研究,但我们发现更多地侧重于IS(例如经济学)或InfoSec(例如访问控制)网点中的某些主题。 在方法和理论上,两个学科都有相似的结果,这表明所有论文中有57%没有任何理论基础,有81%的论文使用“主观论证”方法来支持其工作。
2022-05-25 11:37:36 433KB information security information systems
1
Information Security Foundation based on ISOIEC 27002 exam题.docx
2022-02-15 14:06:16 40KB ISOIEC27002 EXIN
:party_popper: TJCS-Assignment :ship: 精神 同济。 :Christmas_tree: 贡献 欢迎所有同学的 ! 仓库内容可包括所有专业课程的作业。 仓库内 md 文件中的链接均获得原作者许可。 :face_savoring_food: 集锦 100579_人工智能课程设计 101016_计算机组成原理 101019_数据结构 101020_信息隐藏 101029_算法分析与设计 102109_数字逻辑 :church: 免责 仓库中的资料怎么想都不应该商用吧,商用是禁止的。 仓库中所有资料均为 同济大学计算机与科学技术专业、信息安全专业 学生课后作业,所有链接均获得原作者许可。 仓库中所有文件,若侵,联系确认后立删;著作权只属于原作者;拒绝未经允许的使用、分发、传播;仅用于项目所有人的存储。
1
International_Journal_of_Computer_Science_&_Information_Security IJCSIS Vol. 15 No. 7, July 2017
2021-03-31 13:05:35 10.13MB Journal ComputerScience Information Security
No Starch Press 出版的关于信息安全的书,内容比较全面 In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You’ll also learn the basics of topics like: Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates The laws and regulations that protect systems and data Anti-malware tools, firewalls, and intrusion detection systems Vulnerabilities such as buffer overflows and race conditions A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
2020-01-19 03:05:31 3.07MB Security
1
Management of Information Security By 作者: Michael E. Whitman – Herbert J. Mattord ISBN-10 书号: 133740571X ISBN-13 书号: 9781337405713 Edition 版本: 6 出版日期: 2018-05-03 pages 页数: (672 ) $199.95 MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You’ll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
2019-12-21 21:49:52 67.36MB NETWORK
1
Management of Information Security By 作者: Michael E. Whitman – Herbert J. Mattord ISBN-10 书号: 133740571X ISBN-13 书号: 9781337405713 Edition 版本: 6 出版日期: 2018-05-03 pages 页数: (672 ) $199.95 MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You’ll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
2019-12-21 21:49:52 225MB NETWORK
1
Author: Michael E. Whitman, Michael E. Whitman The purpose of this textbook is to fulfill the need for a quality academic textbook in the discipline of information security management.
2019-12-21 19:44:41 15.4MB 信息安全 Security IT管理
1