Amazon cover image
Image from Amazon.com

Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University.

By: Contributor(s): Publisher: Australia : Cengage Learning, c2018Edition: 6th EditionDescription: xx, 728 p. : ill. ; 24 cmISBN:
  • 9781337102063
  • 1337102067
Subject(s): DDC classification:
  • 005.8 23 WHI
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Closed Access Book Closed Access Engineering Library 005.8 WHI 1 (Browse shelf(Opens below)) 1 Available BUML24010398

CONTENTS

INTRODUCTION TO INFORMATION SECURITY
introduction
the history of information security
what is security
CNSS security model
components of an information system
e.tc

THE NEED FOR SECURITY
introduction
threats and attacks
compromises to intellectual property
deviations in quality of service
espionage or Trespass
e.tc

LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY
introduction
law and ethics in information security
relevant U.S laws
international laws and legal bodies
e.tc

PLANNING FOR SECURITY
introduction
information security planning and governance
information security policy, standards and practices
e.tc

RISK MANAGEMENT
introduction
an overview of risk management
risk identification
risk assessment
e.tc

SECURITY TECHNOLOGY: ACCESS CONTROLS, FIREWALLS AND VPNs
introduction
access control
firewalls
protecting remote connections
selected readings
e.tc

SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS AND OTHER SECURITY TOOLS
introduction
intrusion detection and prevention systems
honeypots, honeynets, and padded cell systems
e.tc


CRYPTOGRAPHY
introduction
foundations of cryptology
cipher methods
cryptographic algorithms
e.tc

PHYSICAL SECURITY
introduction
physical access controls
fire security and safety
e.tc

IMPLEMENTING INFORMATION SECURITY
introduction
information security project management
technical aspects of implementation
e.tc

SECURITY AND PERSONNEL
introduction
positioning and staffing the security function
nontechnical security professionals
e.tc

INFORMATION SECURITY MAINTENANCE
introduction
security management maintenance models
digital forensics
selected readings
e.tc

Includes Index. p 711-728

There are no comments on this title.

to post a comment.