By Joseph Migga Kizza & Florence Migga Kizza

As machine networks unfold through the globe and as know-how advances, we're more and more based upon those networks to begin and whole our day-by-day projects. although, during this gradually evolving setting, the privateness, protection, reliability, and integrity of on-line content material is established consistently.

Securing the data Infrastructure offers a framework for development belief in laptop know-how by means of exploring an array of safeguards that may be used to uphold the integrity and reliability of computing structures. This booklet demanding situations readers to envision speedy advances in details know-how to acknowledge its misuse in society, protecting such urgent themes as laptop ethics, desktop community safety, and computing device forensics.

Show description

Read Online or Download Securing the Information Infrastructure PDF

Best network security books

IPSec (2nd Edition)

IPSec, moment variation is the main authoritative, accomplished, available, and updated advisor to IPSec expertise. top specialists conceal all points of IPSec structure, implementation, and deployment; evaluation vital technical advances given that IPSec used to be first standardized; and current new case reports demonstrating end-to-end IPSec safeguard.

A Survey of Data Leakage Detection and Prevention Solutions

SpringerBriefs current concise summaries of state-of-the-art learn and sensible purposes throughout a large spectrum of fields. that includes compact volumes of fifty to a hundred pages (approximately 20,000- 40,000 words), the sequence covers various content material from specialist to educational. Briefs permit authors to offer their rules and readers to take in them with minimum time funding.

Unified Communications Forensics. Anatomy of Common UC Attacks

Unified Communications Forensics: Anatomy of universal UC assaults is the 1st booklet to provide an explanation for the problems and vulnerabilities and display the assaults, forensic artifacts, and countermeasures required to set up a safe (UC) surroundings. This e-book is written by way of best UC specialists Nicholas supply and Joseph W.

CCSP Self-Study CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide

Community safeguard is a truly complicated enterprise. The Cisco photos Firewall plays a few very particular services as a part of the safety technique. it is important to to be acquainted with many networking and community safeguard techniques ahead of you adopt the CSPFA certification. This booklet is designed for defense execs or networking pros who're attracted to starting the protection certification approach.

Additional resources for Securing the Information Infrastructure

Example text

These standards are also very dependent on the profession, but each profession must have a set of common performance standards for all of its members for every type of service or product provided by that profession. For the teaching profession, the standard of output measures may be the passing of standardized examinations at a certain predetermined level. In the law profession, it might be the ability of a judgment to stand on subsequent appeals. Whatever standard of measure is chosen, it must be plausible and measurable.

Some of these variants include: consequentialism, deontology, human nature, relativism, hedonism, and emotivism. Consequentialism We think of the right action as that which produces good consequences. If an act produces good consequences, then it is the right thing to do. Those who subscribe to this position are called consequentialists. Consequentialists judge human actions as good or bad and right or wrong, based on the results of actions—a desirable result denotes a good action, and vice versa.

Need for Moralty and Ethcs  Conclusion In this chapter, we have defined morality and ethics, discussed the need for both, but more so discussed the need for ethics education. In the next chapter, we are going to use this ethics education to build a strong ethical framework, which will form a basis for sound and ethical decision making as one of the techniques to make the information infrastructure safe. References Fagothey, F. A. (1959). ). Rockford, IL: Tan Books and Publishers. Feldman, F.

Download PDF sample

Rated 4.44 of 5 – based on 18 votes