{"id":35702,"date":"2023-03-02T18:21:43","date_gmt":"2023-03-02T18:21:43","guid":{"rendered":"https:\/\/shoppingdealer.com\/?p=35702"},"modified":"2023-03-02T18:21:43","modified_gmt":"2023-03-02T18:21:43","slug":"engineering-information-security-the-application-of-systems-engineering-concepts-to-achieve-information-assurance-ieee-press-series-on-information-networks-security-book-cover-may-vary","status":"publish","type":"post","link":"https:\/\/shoppingdealer.com\/?p=35702","title":{"rendered":"Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance (IEEE Press Series on Information &#8230; Networks Security), Book Cover May Vary"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/m.media-amazon.com\/images\/I\/61UjIOHM5wL.jpg\" class=\"wp_automatic_gallery\" \/><br \/>\nPrice: <span style=\"color:#b12704\">[price_with_discount]<\/span><br \/><i><small>(as of [price_update_date] &#8211; <span class=\"wp_automatic_amazon_disclaimer\" title=\"Product prices and availability are accurate as of the date\/time indicated and are subject to change. Any price and availability information displayed on [relevant Amazon Site(s), as applicable] at the time of purchase will apply to the purchase of this product.\">Details<\/span>)<\/small><\/i><\/p>\n<p><a href=\"https:\/\/amazon.com\/dp\/1119101603?tag=e038-20\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/i.imgur.com\/ISRHEWs.png?w=720&#038;ssl=1\"><\/a><br \/>\n[ad_1]<br \/>\n  Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information.<\/p>\n<p> Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networksCovers internal operations security processes of monitors, review exceptions, and plan remediationOver 15 new sectionsInstructor resources such as lecture slides, assignments, quizzes, and a set of questions organized as a final exam If you are an instructor and adopted this book for your course, please email ieeeproposals@wiley.com to get access to the additional instructor materials for this book.    <br \/> <br \/>\n         From the brand                               <\/p>\n<p>                                      <img data-recalc-dims=\"1\" decoding=\"async\" alt=\"IEEE\" src=\"https:\/\/i0.wp.com\/images-na.ssl-images-amazon.com\/images\/G\/01\/x-locale\/common\/grey-pixel.gif?w=720&#038;ssl=1\" class=\"a-lazy-loaded\" data-src=\"https:\/\/m.media-amazon.com\/images\/S\/aplus-media-library-service-media\/bf883aee-2a69-4b4c-a1b8-46af8470ae42.__CR0,0,1464,625_PT0_SX1464_V1___.jpg\"><img decoding=\"async\" alt=\"IEEE\" src=\"https:\/\/m.media-amazon.com\/images\/S\/aplus-media-library-service-media\/bf883aee-2a69-4b4c-a1b8-46af8470ae42.__CR0,0,1464,625_PT0_SX1464_V1___.jpg\">   <\/p>\n<p>                                      <img data-recalc-dims=\"1\" decoding=\"async\" alt=\"IEEE\" src=\"https:\/\/i0.wp.com\/images-na.ssl-images-amazon.com\/images\/G\/01\/x-locale\/common\/grey-pixel.gif?w=720&#038;ssl=1\" class=\"a-lazy-loaded\" data-src=\"https:\/\/m.media-amazon.com\/images\/S\/aplus-media-library-service-media\/dcd94775-0895-4be1-a6c1-0dca0f0bd4fa.__CR0,0,315,145_PT0_SX315_V1___.jpg\"><img decoding=\"async\" alt=\"IEEE\" src=\"https:\/\/m.media-amazon.com\/images\/S\/aplus-media-library-service-media\/dcd94775-0895-4be1-a6c1-0dca0f0bd4fa.__CR0,0,315,145_PT0_SX315_V1___.jpg\">   <\/p>\n<p> IEEE, the world\u2019s largest  technical professional organization, partners with Wiley to bring to you  high-quality books and reference works in electrical engineering and  computer science. <\/p>\n<p> Written by leading experts, the books  are authoritative and cutting-edge and cover in-demand topics in these  important areas of research. <\/p>\n<h3> Learn More <\/h3>\n<p class=\"apm-brand-story-stores-link\">\n<h3> Learn More <\/h3>\n<p class=\"apm-brand-story-stores-link\">\n<p> ASIN                                    \u200f                                        :                                    \u200e                                 1119101603 <br \/> Publisher                                    \u200f                                        :                                    \u200e                                 Wiley-IEEE Press; 2nd edition (December 14, 2015) <br \/> Language                                    \u200f                                        :                                    \u200e                                 English <br \/> Hardcover                                    \u200f                                        :                                    \u200e                                 784 pages <br \/> ISBN-10                                    \u200f                                        :                                    \u200e                                 9781119101604 <br \/> ISBN-13                                    \u200f                                        :                                    \u200e                                 978-1119101604 <br \/> Item Weight                                    \u200f                                        :                                    \u200e                                 2.44 pounds <br \/> Dimensions                                    \u200f                                        :                                    \u200e                                 6.2 x 1.4 x 9.2 inches <\/p>\n<p>[ad_2]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Price: [price_with_discount](as of [price_update_date] &#8211; Details) [ad_1] Engineering Information Security covers all aspects of information security using a systematic engineering approach and focuses on the viewpoint of how to control access to information. Includes a discussion about protecting storage of private keys, SCADA, Cloud, Sensor, and Ad Hoc networksCovers internal operations security processes of monitors, review exceptions, and plan remediationOver [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35703,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-35702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cellphones-telecommunications"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/shoppingdealer.com\/wp-content\/uploads\/2023\/03\/61UjIOHM5wL.jpg?fit=856%2C1360&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=\/wp\/v2\/posts\/35702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35702"}],"version-history":[{"count":0,"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=\/wp\/v2\/posts\/35702\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=\/wp\/v2\/media\/35703"}],"wp:attachment":[{"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shoppingdealer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}