Principles of Information Security / Edition 2

Principles of Information Security / Edition 2

by Michael E. Whitman, Herbert J. Mattord, Herbert J. Mattord, Herbert Mattord
     
 


Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this bestseller teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of… See more details below

Overview


Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this bestseller teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program. Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers.

Product Details

ISBN-13:
9780619216252
Publisher:
Cengage Learning
Publication date:
11/23/2004
Edition description:
Older Edition
Pages:
600
Product dimensions:
7.30(w) x 9.10(h) x 1.30(d)

Meet the Author


Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology.

Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.

Read More

Table of Contents


1. Introduction to Information Security. 2. The Need for Security. 3. Legal, Ethical, and Professional Issues in Information Security. 4. Planning for Security. 5. Risk Management. 6. Security Technology: Firewalls, VPNs, and Wireless. 7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools. 8. Cryptography. 9. Physical Security. 10. Implementing Information Security. 11. Security and Personnel. 12. Information Security Maintenance and eDiscovery.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >