Skip to Main Content
Riphah International University
LibGuides
Information Assurance
Course Outline
Search this Guide
Search
Information Assurance: Course Outline
BS-CY3203
Home
Course Outline
E-Resources
Societies
Referencing
Toggle Dropdown
APA Referencing Style
Harvard Referencing Style
Chicago Referencing Style
MLA Referencing Style
Vancouver Referencing Style
EndNote
Course Outline
Introduction to (IS) Information System (Concept, Design, Functions, Architecture,
Components and applications of IS);
Secure System Planning and Administration;
Information Security Policies and Procedures;
Asset Management; Organizational and
Human Security; Cyber Security Management Concepts;
NIST Cyber Security Framework;
Enterprise Roles and Structures;
Strategic Planning; Security Plans and Policies;
Contingency Planning;
Laws;
Laws and Regulatory Requirements;
Security Standards and Controls, Risk Management
Process, NIST Risk Management Framework, Security Metrics and Key Performance
Indicators (KPIs);
Physical Security and Environmental Events;
Contingency Planning;
Security Education, ISO 27001 Compliance, Training, and Awareness.
Text Books
Guide to computer forensics and investigations
by
Nelson, Bill | Amelia Phillips | Christopher Steuart
Call Number: 005.8 NEL
ISBN: 9788131519462
Publication Date: 2010
Reference Material
Network forensics an analysis of techniques tools and trends
Issue No.12 - Dec. (2012 vol.45) pp: 36-43
Published by the IEEE Computer Society
Bringing science to digital forensics with standardized forensic corpora
Simson Garfinkel, Paul Farrell, Vassil Roussev
Digital investigation 6 (2009)
Elsevier
Building theoretical underpinnings for digital forensics research
Dr. Sarah Mocas
Digital Investigation, Volume 1, Issue 1, February 2004, Pages 61–68
Digital Forensics: defining a research agenda
Nance, K. ; Hay, B. ; Bishop, M.
System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference. Publisher:
IEEE
Digital forensics research: The next 10 years
Simson L. Garfinkel,
Digital Investigation, Volume 7, Supplement, August 2010, Pages S64–S73
The future of computer forensics: a needs analysis survey
Marcus K Rogers, Kate Seigfried,
Computers & Security. Volume 23, Issue 1, February 2004, Pages 12–16
Other Books (Full Text)
Penetration Testing : A Hands-On Introduction to Hacking
by Weidman, Georgia
Date Published June 2014
Pages 531
At the Nexus of Cybersecurity and Public Policy : Some Basic Concepts and Issues
by National Research Council
Date Published June 2014
Pages 149
Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions
by Gomzin, Slava
Date Published February 2014
Pages 314
Threat Modeling : Designing for Security
by Shostack, Adam
Date Published February 2014
Pages 626
Data-Driven Security : Analysis, Visualization and Dashboards
by Jacobs, Jay Rudis, Bob
Date Published January 2014
Pages 353
Policing Digital Crime
by Bryant, Robin Bryant, Sarah
Date Published January 2014
Pages 277
Dark Sides of the Internet : On Cyber Threats and Information Warfare
by Heickerö, Roland
Date Published November 2012
Pages 170
<<
Previous:
Home
Next:
E-Resources >>