You must be logged in to post a review.
Academic book request
Inspection copies are available to lecturers and course leaders considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with your details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
In-line with our Environmental Policy and to avoid unnecessary wastage, we provide digital access for inspection copy purposes. Print copies can be provided if books are adopted as course reading.
Please note that all requests are subject to our approval. Further details regarding our inspection copy service may be found HERE.
Access Control and Identity Management
Author: Mike ChappleOVERVIEW
This product is available with Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills.
Access control protects resources against unauthorised viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorised disclosure. Revised and updated with the latest data from this fast-paced field, Access Control and Identity Management, Third Edition defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. Focusing on Identity and Security Management, this new edition looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. This valuable resource provides both students and professional with details and procedures on implementing access control systems as well as managing and testing those systems.
Features and Benefits
- Available with updated cybersecurity Cloud Labs
- Examples depicting the risks associated with a missing unencrypted laptop containing private data
- New Case Study on Biometrics
- New sections on the Federal Information Security Management Act (FISMA) concerning US compliance
- Restructured organization of topics to better align with both the subject matter and student learning
- Updated references, examples, and screenshots of Software
- New information on Risk Adaptive Access Control (RAdAC)
TABLE OF CONTENTS
- Part 1 The Need For Access Control Systems
- Chapter 1 Access Control Framework
- Chapter 2 Business Drivers for Access Control
- Chapter 3 Human Nature and Organizational Behavior
- Chapter 4 Assessing Risk and Its Impact on Access Control
- Part 2 Implementic Access Control Systems
- Chapter 5 Access Control in the Enterprise
- Chapter 6 Mapping Business Challenges to Access Control Types
- Chapter 7 Access Control System Implementations
- Chapter 8 Access Control for Information Systems
- Chapter 9 Physical Security and Access Control
- Chapter 10 Access Control Solutions for Remote Workers
- Part 3 Managing and Testing Access Control Systems
- Chapter 11 Public Key Infrastructure and Encryption
- Chapter 12 Testing Access Control Systems
- Chapter 13 Access Control Assurance
- Chapter 14 Access Control Laws, Policies, and Standards
- Chapter 15 Security Breaches and the Law
Related Products
Our Reviews
Blog
Last Month's Bestseller
Ambulance Care Practice
Brought up-to-date with the latest guidance, research and policy, this second edition of Ambulance Care Practice is an essential guide for paramedic students, trainee associate ambulance practitioners, those studying towards...
ViewBecome a Class VIP!
Sign up to hear about new products, promotions and more! Plus, enjoy a 25% discount and free P&P each month!
Reviews
There are no reviews yet.