Management of Information Security, 6/e (IE-Paperback)【內含Access Code,經刮除不受退】

Management of Information Security, 6/e (IE-Paperback)【內含Access Code,經刮除不受退】

作者: Michael E. Whitman Herbert J. Mattord
出版社: Cengage Learning
出版在: 2019-01-01
ISBN-13: 9789814834735
ISBN-10: 9814834734
總頁數: 752 頁





內容描述


本書序言
    This sixth edition of Management of Information Security tightens its focus on the managerial aspects of information security, continues to expand the coverage of governance and compliance issues, and continues to reduce the coverage of foundational and technical components. While retaining enough foundational material to allow reinforcement of key concepts, this edition has fewer technical examples. This edition also contains updated in-depth discussions and Offline features, and additional coverage in key managerial areas: risk management, information security governance, access control models, and information security program assessment and metrics.
    The material on personnel management has been consolidated and reorganized. Personnel placement, staffing, and credentials are now covered in Chapter 5, and employment practices are discussed in Chapter 9. Digital forensics is now covered in Chapter 2.
    In general, the entire text has been updated and re-organized to reflect changes in the field, including revisions to sections on national and international laws and standards, such as the ISO 27000 series, among others. Throughout the text, the content has been updated, with newer and more relevant examples and discussions. A complete coverage matrix of the topics in this edition is available to instructors to enable mapping of the previous coverage to the new structure. Please contact your sales representative for access to the matrix.
本書特色
●CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALS (CISSP) AND CERTIFIED INFORMATION SECURITY MANAGERS (CISM) INFORMATION INTEGRATED THROUGHOUT. The authors have carefully incorporated both CISSP and CISM bodies of knowledge throughout the text to prepare your students for certification. Chapter scenarios follow a fictional company as it encounters various information security issues. Meaningful group discussion questions follow each scenario to prompt lively classroom dialogue and debate.
●WRITTEN BY SECURITY PROFESSIONALS. This text and its ancillary features were meticulously designed by security professionals who are also teaching faculty members. Their experiences and expertise from classroom and industry are woven throughout chapter content to provide instructors with a well-designed, comprehensive security management instructional tool, complete with modern virtual ancillaries and teaching support aids. The text reflects key industry trends and issues, while facilitating the organization, delivery and assessment of student knowledge.
●"VIEWPOINT" ESSAYS ILLUSTRATE INTRUIGING TOPICS. Written by security practitioners and academics, Viewpoint essays in each chapter use real-world examples to illustrate chapter concepts at work in today's business environments.
●ACTIVITIES, QUESTIONS AND PROJECTS REINFORCE SKILLS. Your students have numerous opportunities to apply what they are learning with in-depth review questions, hands-on activities and case projects in every chapter.
●EMPHASIS ON KEY EXECUTIVE AND MANAGERIAL ASPECTS OF INFORMATION SECURITY. As they progress through the text, students build on their strong foundation of key concepts and become proficient in the most important areas of information security and management.


目錄大綱


  1. Introduction to Management of Information Security
  2. Compliance: Law and Ethics
  3. Governance and Strategic Planning for Security
  4. Information Security Policy
  5. Developing the Security Program
  6. Risk Management: Identifying and Assessing Risk
  7. Risk Management: Controlling Risk
  8. Security Management Models
  9. Security Management Practices
  10. Planning for Contingencies
  11. Security Maintenance 
  12. Protection Mechanisms



相關書籍

Pro ASP.NET Web API Security: Securing ASP.NET Web API (Paperback)

作者 Badrinarayanan Lakshmiraghavan

2019-01-01

The Pentester Blueprint: Starting a Career as an Ethical Hacker

作者 Wylie Phillip L. Crawley Kim

2019-01-01

Python 滲透測試編程技術:方法與實踐

作者 李華峰

2019-01-01