menu
{ "item_title" : "Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process", "item_author" : [" Rodney Alexander "], "item_description" : "Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/47/878/792/1478787929_b.jpg", "price_data" : { "retail_price" : "16.95", "online_price" : "16.95", "our_price" : "16.95", "club_price" : "16.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process|Rodney Alexander

Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures.

This item is Non-Returnable

Details

  • ISBN-13: 9781478787921
  • ISBN-10: 1478787929
  • Publisher: Outskirts Press
  • Publish Date: March 2017
  • Dimensions: 10 x 7 x 0.16 inches
  • Shipping Weight: 0.33 pounds
  • Page Count: 78

Related Categories

You May Also Like...

    1

BAM Customer Reviews