More FIX on the NET @ FIX University Cultural Campus
Welcome to Spring Semester 2013
The Best College Radio Stations
If you choose to investigate the subject of this course in more depth, I suggest
three excellent textbooks. Note that these texts are optional. However,
Schroeder's The Lure will be one of the readings for Week 2, so I
recommend you purchase at least this book.
- Schroeder, S. (2012). The Lure. Boston, MA: Course Technology. ISBN: 13-978-1-4354-5712-6
- Mather, Kumaraswamy, Latif. (2009). Cloud Security and Privacy: An Enterprise Perspective. Sebastopol, CA: O’Reilly Media, Inc. ISBN: 978-0-596-80276-9
- Calder, A. and Watkins, S. (2008). IT Governance: A Manager’s Guide to Data Security and ISO27001/ISO27002, 4th ed. London: Kogan Page. ISBN: 978-0-7494-5271-1
In addition, I suggest as a reference book
- Gregory, P. (2010). CISSP Guide to Security Essentials. Boston, MA: Course Technology. ISBN 13: 978-1-435-42819-5
Another useful text is
- Tipton, Harold, and Steven Hernandez. (2009). Official (ISC)2 Guide to the CISSP CBK, 2nd ed. Auerbach Publications. ISBN 13: 978-1439809594
Dr. Barbara Endicott-Popovsky
Director, Center for Information Assurance and Cybersecurity
Academic Director, Master of Infrastructure Planning and Management
Fellow, Aberystwyth University, Wales
No hay comentarios:
Publicar un comentario