It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
IST 140 - Introduction to Computing
This guide contains resources to help with the research assignment in Dr. Engebretson's IST 140 course.
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity.
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, "self-teaching" format.It introduces all of the major subjects related to cybersecurity, includingdata security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, cloud security, and more.
Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues.
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program.