Skip to main content
Books On Engineering

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information and Communication Networks Security)

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information and Communication Networks Security)

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information and Communication Networks Security)
By Stuart Jacobs

This item is not available for purchase from this store.
Buy at Amazon


42 new or used available from $85.00

Average customer review: logo
(2 customer reviews)

Book Description

Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information.

  • Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networks
  • Covers internal operations security processes of monitors, review exceptions, and plan remediation
  • Over 15 new sections
  • Instructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam
If you are an instructor and adopted this book for your course, please email [email protected] to get access to the additional instructor materials for this book.


Book Details

  • Amazon Sales Rank: #111989 in Books
  • Published on: 2015-12-14
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.55" h x 1.30" w x 6.40" l, .0 pounds
  • Binding: Hardcover
  • 784 pages

Editorial Reviews

From the Back Cover

This book considers the complete security lifecycle of products and services starting with requirements and policy development and progressing through deployment, operations, and decommissioning.

Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information. Unlike other books that focus on security mechanisms, threats, and vulnerabilities, this book presents a methodology for addressing security concerns in any organization. The methodology is based on a set of concepts that are designed to methodically examine, analyse, and document objectives, and the functional and performance capabilities that need to exist to achieve the stated goals.

This book begins by considering the importance of information security. Legal, technical, competitive, criminal, and consumer forces and influences that are rapidly changing our information dependent society are also discussed. Concepts of systems engineering are explored, as well as the value they provide to new products and services along with the maintenance and evolution to existing products and services. A discussion of security services follow along with what technical and procedural controls instantiate these services. Network protocols are examined focusing on exploitable vulnerabilities. An in-depth discussion of computer security capabilities is provided followed by consideration of modern networking security controls. The book concludes by discussing operations security as part of information security governance.

This new edition includes:

  • Fifteen new sections throughout
  • Additional discussions on SCADA, Cloud, Sensor, Ad Hoc networks, and HTTP Basic and Digest authentication
  • Coverage of code reviews, code scanning tools and testing, and SSL VPNs
  • Instructor resources include lecture slides, example quizzes, assignments, and a final examination
  • Seven online appendices that include: example information security policies, security requirements, a security Statement of Work, and risk management tables suitable for SQL implementation

Over time, the technologies used for processing, storing, and communicating information have changed dramatically and rapidly. By presenting a systems engineering approach to information security, this book will assist security practitioners to cope with these rapid changes.

Stuart Jacobs is a Lecturer at Boston University, teaching graduate courses on Network and Computer Security and Enterprise Information Security, along with advising on security curricula issues. Mr. Jacobs also serves as an Industry Security Subject Matter Expert for the Alliance for the Telecommunications Industry Solutions (ATIS) and as the Technical Editor of the ATIS Technical Report “Information and Communications Security for NGN Converged Services IP Networks and Infrastructure” and ITU-T M.3410, “Guidelines and Requirements for Security Management Systems”. Stuart holds an MSc degree and CISSP Certification, and is a member of IEEE and IEEE Computer Society, Association for Computing Machinery (ACM), International Information Systems Security Certification Consortium (ISC)2, Information Systems Security Association (ISSA) and InfraGuard.

About the Author
Stuart Jacobs is a Lecturer at Boston University, teaching graduate courses on Network and Computer Security and Enterprise Information Security, along with advising on security curricula issues. Mr. Jacobs also serves as an Industry Security Subject Matter Expert for the Alliance for the Telecommunications Industry Solutions (ATIS) and as the Technical Editor of the ATIS Technical Report “Information and Communications Security for NGN Converged Services IP Networks and Infrastructure” and ITU-T M.3410, “Guidelines and Requirements for Security Management Systems”. Stuart holds an MSc degree and CISSP Certification, and is a member of IEEE and IEEE Computer Society, Association for Computing Machinery (ACM), International Information Systems Security Certification Consortium (ISC)2, Information Systems Security Association (ISSA) and InfraGuard.


Customer Reviews

Most helpful customer reviews

0 of 0 people found the following review helpful.
1Dated
By DaveTheIdiot
This book is very dated! It uses old terminology and makes references to terms and phrases, but fails to go in depth into those areas. Furthermore, context is poorly structured at times. This book appears to e written like a college essay rather than a professional textbook.

0 of 0 people found the following review helpful.
4Useless index but wonderful book otherwise!
By Meg Cassidy
I feel like much of the content was repeated too many times or unnecessary and the index in the back was useless, but otherwise it was a very informative book.

See all 2 customer reviews...
We strive to provide excellent resources for our site visitors.
We make available for information whatever we consider to be a good source of information to Engineering students and practitioners.
If you have any complaint about any of our partners products, please let us know by writing a review at Amazon Product Reviews, so that we may remove it from our store