Readings and Cases in Information Security
Author : Michael E. Whitman
Publisher :
Page : pages
File Size : 29,42 MB
Release : 2011
Category :
ISBN : 9780176850777
Author : Michael E. Whitman
Publisher :
Page : pages
File Size : 29,42 MB
Release : 2011
Category :
ISBN : 9780176850777
Author : Michael E. Whitman
Publisher : Cengage Learning
Page : 0 pages
File Size : 20,29 MB
Release : 2006
Category : Computer networks
ISBN : 9780619216276
This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.
Author : Scott Barman
Publisher : Sams
Page : 216 pages
File Size : 27,5 MB
Release : 2002
Category : Computers
ISBN : 9781578702640
Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.
Author : Michael E. Whitman
Publisher : Course Technology
Page : 0 pages
File Size : 36,30 MB
Release : 2004
Category : Computer networks
ISBN : 9780619215156
Designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security, this work includes extensive end-of-chapter pedagogy to reinforce concepts as they are learned.
Author : Michael E. Whitman
Publisher : Course Technology
Page : 752 pages
File Size : 42,72 MB
Release : 2021-06-15
Category :
ISBN : 9780357506431
Discover the latest trends, developments and technology in information security with Whitman/Mattord's market-leading PRINCIPLES OF INFORMATION SECURITY, 7th Edition. Designed specifically to meet the needs of information systems students like you, this edition's balanced focus addresses all aspects of information security, rather than simply offering a technical control perspective. This overview explores important terms and examines what is needed to manage an effective information security program. A new module details incident response and detection strategies. In addition, current, relevant updates highlight the latest practices in security operations as well as legislative issues, information management toolsets, digital forensics and the most recent policies and guidelines that correspond to federal and international standards. MindTap digital resources offer interactive content to further strength your success as a business decision-maker.
Author : Christopher J. Alberts
Publisher : Addison-Wesley Professional
Page : 516 pages
File Size : 32,43 MB
Release : 2003
Category : Business & Economics
ISBN : 9780321118868
Describing OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation), a method of evaluating information security risk, this text should be of interest to risk managers.
Author : Krag Brotby
Publisher : John Wiley & Sons
Page : 207 pages
File Size : 42,17 MB
Release : 2009-04-22
Category : Computers
ISBN : 0470476001
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival. Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers: The business case for information security Defining roles and responsibilities Developing strategic metrics Determining information security outcomes Setting security governance objectives Establishing risk management objectives Developing a cost-effective security strategy A sample strategy development The steps for implementing an effective strategy Developing meaningful security program development metrics Designing relevant information security management metrics Defining incident management and response metrics Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.
Author : Joanna Lyn Grama
Publisher : Jones & Bartlett Publishers
Page : 570 pages
File Size : 38,66 MB
Release : 2014-06-19
Category : Computers
ISBN : 1284054756
This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. --
Author : Dorothy Elizabeth Robling Denning
Publisher : Addison-Wesley Professional
Page : 556 pages
File Size : 48,45 MB
Release : 1999
Category : Computers
ISBN :
What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitive information. We hear how they have tampered with medical records, disrupted emergency 911 systems, and siphoned money from bank accounts. Could information terrorists, using nothing more than a personal computer, cause planes to crash, widespread power blackouts, or financial chaos? Such real and imaginary scenarios, and our defense against them, are the stuff of information warfare-operations that target or exploit information media to win some objective over an adversary. Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary. You will find in this book: A comprehensive and coherent treatment of offensive and defensive information warfare, identifying the key actors, targets, methods, technologies, outcomes, policies, and laws; A theory of information warfare that explains and integrates within a single framework operations involving diverse actors and media; An accurate picture of the threats, illuminated by actual incidents; A description of information warfare technologies and their limitations, particularly the limitations of defensive technologies. Whatever your interest or role in the emerging field of information warfare, this book will give you the background you need to make informed judgments about potential threats and our defenses against them. 0201433036B04062001
Author : Information Resources Management Association
Publisher : IGI Global
Page : 2031 pages
File Size : 32,9 MB
Release : 2013-04-30
Category : Business & Economics
ISBN : 1466638877
"This book provides a comprehensive collection of research on current technological developments and organizational perspectives on the scale of small and medium enterprises"--Provided by publisher.