Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to
Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networks
Covers internal operations security processes of monitors, review exceptions, and plan remediation
Over 15 new sections
Instructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam
If you are an instructor and adopted this book for your course, please email firstname.lastname@example.org to get access to the additional instructor materials for this book.