Last edited by Vugal
Thursday, August 6, 2020 | History

2 edition of Management of information security found in the catalog.

Management of information security

Michael E. Whitman

Management of information security

by Michael E. Whitman

  • 68 Want to read
  • 27 Currently reading

Published by Course Technology Cengage Learning in Australia, United States .
Written in English


Edition Notes

Includes bibliographical references and index.

StatementMichael Whitman, Herbert Mattord
ContributionsMattord, Herbert J.
Classifications
LC ClassificationsTK5105.59 .W5356 2010
The Physical Object
Paginationxxv, 546 p. :
Number of Pages546
ID Numbers
Open LibraryOL24383063M
ISBN 101435488849
ISBN 109781435488847
LC Control Number2009942390

  Information Security Management Handbook by Harold F. Tipton, Micki Krause- The book illustrates the domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. The book is recommended for preparation of the Certified Information System Security Professional (CISSP) exam and provides comprehensive up-to-date reference. Management of Information Security, 4Security, 4th Edition Chapter 12Chapter 12 Law and Ethics Acknowledgement: with very minor modification from the author’s slidesmodification from the .

Fundamentals of Information Systems, Fifth Edition 42 Organizations and Information Systems (continued) • Value chain – Series of activities that includes inbound logistics, warehouse and storage, and production • Supply chain management (SCM) – Helps determine what supplies are required for the. An information security management program is neces- sary because threats to the availability, integrity, and confi dentiality of the organization’s information are great and, apparently, ever Size: KB.

Effective Security Management, Sixth Edition. teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. Managing information security in essence means managing and mitigating the various threats and vulnerabilities to assets, while at the same time balancing the management effort expended on potential threats and vulnerabilities by gauging the probability of them actually occurring.


Share this book
You might also like
Survey on educational issues and expectations

Survey on educational issues and expectations

Independence for Puerto Rico

Independence for Puerto Rico

two-years journal in New York and part of its territories in America.

two-years journal in New York and part of its territories in America.

Speech of Hon. J. P. Benjamin, of Louisiana, on the right of secession

Speech of Hon. J. P. Benjamin, of Louisiana, on the right of secession

Articulation of secondary and post-secondary occupational education programs

Articulation of secondary and post-secondary occupational education programs

NAFTA

NAFTA

Zagat 1993-1994 Pacific Northwest

Zagat 1993-1994 Pacific Northwest

heart opened wide

heart opened wide

Revision Notes on Building Economics (Revision Notebooks for Building Students)

Revision Notes on Building Economics (Revision Notebooks for Building Students)

Design in Ireland

Design in Ireland

Soybeans, cooperatives, and Ag Processing Inc

Soybeans, cooperatives, and Ag Processing Inc

Basic statistics for business and economics

Basic statistics for business and economics

Shaker collection of the Western Reserve Historical Society

Shaker collection of the Western Reserve Historical Society

Modern developments in financial management

Modern developments in financial management

Elements of a fast decimal arithmetic unit

Elements of a fast decimal arithmetic unit

author, title, and subject check list of Smithsonian Institution publications relating to anthropology

author, title, and subject check list of Smithsonian Institution publications relating to anthropology

Management of information security by Michael E. Whitman Download PDF EPUB FB2

He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Mattord is a member of the Information Systems Security Association, ISACA, Cited by: Management of Information Security primarily focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics.

Coverage on the foundational and technical components of information security is included to reinforce key concepts/5(62). Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike.

Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security/5.

This edition offers a tightened focus on key executive and managerial aspects of information security while retaining the foundational instruction to reinforce key IT concepts. Updated content reflects the latest developments in the field, such as NIST, ISO, and security governance.

Management of information security book In The CIO’s Guide to Information Security Incident Management, authors Matthew Pemble and Wendy Goucher focus on the setup and running of an incident response organization. The guidance is aimed toward the management professional with standard computer technology skills and the IT operations manager with minimal specific security skills.

You might wonder why a DevOps book is on a security list. This book is about the holistic approach that is required to securely implement and leverage the power of DevOps.

It touches on security and testing strategies, organizational structures and alignment, and how to implement controls that pay off in better availability, security, and efficiency.

Explore a preview version of Information Security and IT Risk Management right now. O’Reilly members get unlimited access to live online training experiences, plus books, videos, and digital content from + publishers. Book title: Management Of Information Security, 5th Edition Author/Publisher: Whitman & Mattord/Cengage Edition and Year: 5 th, ISBN: ISBN Paperback Course Description Provides a conceptual overview of information security management and information assurance (IA).

Topics coveredFile Size: 49KB. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The second edition includes the security of cloud-based resources and the contents have been revised to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports.

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger on the pulse of industry changes and academic ant Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information : $ Readers discover a managerially-focused overview of information security with a thorough treatment of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E.

Information. Information Technology Security Handbook v T he Preparation of this book was fully funded by a grant from the infoDev Program of the World Bank Group.

The topic of Information Technology (IT) security has been growing in importance in the last few years, and. Taking a managerial approach, this bestseller teaches all the aspects of information security-not just the technical control perspective.

It provides a broad review of the entire field of. Michael E. Whitman has 22 books on Goodreads with ratings. Michael E. Whitman’s most popular book is Principles of Information Security. Achieving and maintaining accredited certification to the international standard for information security management, ISOcan be a complicated job, especially if you are new to the Standard.

This book offers essential guidance for anyone tackling ISO implementation for the first : Camden Woollven. Security policy requires the creation of an ongoing information management planning process that includes planning for the security of each organization's information assets.

Risk management is an ongoing, proactive program for establishing and maintaining an acceptable information system security. This book describes the changing risk environment and why a fresh approach to information security is needed. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.

With that in mind, I’ve compiled a short list of the top twelve introductory information security and endpoint cybersecurity books available today, listed in no particular order.

We have also built a small book library on this site, which you can access here. Information Security Cost Management Ioana V. Bazavan and Ian Lim ISBN: Information Security Fundamentals Thomas R. Peltier, Justin Peltier and John A. Blackley ISBN: Information Security Management Handbook, Sixth Edition Harold F.

Tipton and Micki Krause ISBN: Information Security Risk Analysis. Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.

It offers in-depth coverage of the current technology and practice Pages: Information Security: Principles and Practices, Second Edition information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Principle 7: Security = Risk Management. 25 Principle 8: The Three Types of Security .