Readings and Cases in the Management of Information Security / Edition 1

Readings and Cases in the Management of Information Security / Edition 1

by Michael E. Whitman, Herbert J. Mattord
     
 

ISBN-10: 0619216271

ISBN-13: 9780619216276

Pub. Date: 03/11/2005

Publisher: Cengage Learning


These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry…  See more details below

Overview


These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry professionals.

Product Details

ISBN-13:
9780619216276
Publisher:
Cengage Learning
Publication date:
03/11/2005
Edition description:
New Edition
Pages:
272
Sales rank:
1,447,303
Product dimensions:
7.40(w) x 9.10(h) x 0.60(d)

Table of Contents


Part 1: Readings in the Management of Information Security Reading 1: Mobile Device Security Management, Benjamin J. Halpert Reading 2: Linking Business Objectives and Security Directives, Donald L. Pipkin Reading 3: Managing Incident Response, David M. Shackleford Reading 4: Zen and the Art of Information Security-A Philosophical, Spiritual and Mystical Approach to Protecting Information, Michael E. Whitman; Herbert J. Mattord Reading 5: The Role of Information Security and Its Relationship to Information Technology Risk Management, Chrisan Herrod Reading 6: Architecting and Managing Secure Biometric Systems, Kameswara Raonamuduri; Savitha S. Kadiyala Reading 7: Integration and Ethical Perspectives for Information Systems Management, Ernest A. Capozzoli; Rober D. Winsor; Sheb L. True Reading 8: Security Education, Training, and Awareness from a Human Performance Technology Point of View, Melissa J. Dark Reading 9: The Provision of Defenses Against Internet-Based Attacks, Li-Chiou Chen; Thomas A. Longstaff; Kathleen M. Carley Reading 10: Trust, Controls and Information Security, Irene Woon & Atreyi Kankanhalli Reading 11: Hierarchical Model of Organizational Work in the Sphere of Information Security, Alexander Anisimov Reading 12: Transparency in Information Security System Design, Herbert J. Mattord; Michael E. Whitman Part 2: Cases in the Management of Information Security CASE A: Computer Gaming Technologies-CGT Inc., Michael E. Whitman; Herbert J. Mattord CASE B: Assessing and Mitigating the Risks to a Hypothetical Computer System, National Institute of Standards and Technology (NIST); Technology Administration; U.S. Department of Commerce CASE C: Random Widget Works, Michael E. Whitman; Herbert J. Mattord CASE D: Sequential Label and Supply, Herbert J. Mattord; Michael E. Whitman CASE E: Brightington Academy, Michael E. Whitman; Herbert J. Mattord CASE F: The 9/11 Commission Report, Herbert J. Mattord; Michael E. Whitman

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >