Nelson Higher Education

Higher Education

Fundamentals of Information Systems Security, 3rd Edition

  • David Kim
  • ISBN-10: 128411645X
  • ISBN-13: 9781284116458
  • 0 Pages | Paperback
  • COPYRIGHT: 2018 Published
Request a Copy for Review


About the Product

Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.


  • Available with Virtual Security Cloud Lab learning environment, which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios

  • Mapped to leading certification standards

  • Focuses on new risks, threats, and vulnerabilities associated with the transformation to a digital world

  • Provides a resource for readers desiring more information on information security standards, education, professional certifications, and recent compliance laws

About the Author

David Kim

David Kim is president and chief security officer for Security Evolutions, Inc. (SEI), located outside Washington, D.C., in Fairfax, Virginia. SEI provides IT security training and consulting services for organizations around the world. SEI has specific expertise and experience in VoIP and SIP layered security solutions where privacy data may encompass both data and voice communications. Mr. Kim’s IT and IT security experience encompasses more than 20 years of technical engineering, technical management, and sales and marketing management. This experience includes LAN/WAN, internetworking, enterprise network management, and IT security for voice, video, and data networking infrastructures. Previously, Mr. Kim was chief operating officer of (ISC)2 Institute located in Vienna, Virginia, where he was responsible for content development, educational products, and educational delivery for (ISC)2 ( and its IT security professional certifications.

Table of Contents

Part One: The Need for Information Security
Chapter 1: Information Systems Security
Chapter 2: The Internet of Things is Changing How We Live
Chapter 3: Malicious Attacks, Threats, and Vulnerabilities
Chapter 4: The Drivers of the Information Security Business

Part Two: Securing Today’s Information Systems
Chapter 5: Access controls
Chapter 6: Security Operations and Administration
Chapter 7: Auditing, Testing, and Monitoring
Chapter 8: Risk, Response, and Recovery
Chapter 9: Cryptography
Chapter 10: Networks and Telecommunications
Chapter 11: Malicious Code and Activity

Part Three: Information Security Standards, Education, Certifications, and Laws
Chapter 12: Information Security Standards
Chapter 13: Information Systems Security Education and Training
Chapter 14: Information Security Professional Certifications
Chapter 15: U.S. Compliance Laws