Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University.
Publisher: Australia : Cengage Learning, c2018Edition: 6th EditionDescription: xx, 728 p. : ill. ; 24 cmISBN:- 9781337102063
- 1337102067
- 005.8 23 WHI
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Closed Access | Engineering Library | 005.8 WHI 1 (Browse shelf(Opens below)) | 1 | Available | BUML24010398 |
CONTENTS
INTRODUCTION TO INFORMATION SECURITY
introduction
the history of information security
what is security
CNSS security model
components of an information system
e.tc
THE NEED FOR SECURITY
introduction
threats and attacks
compromises to intellectual property
deviations in quality of service
espionage or Trespass
e.tc
LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY
introduction
law and ethics in information security
relevant U.S laws
international laws and legal bodies
e.tc
PLANNING FOR SECURITY
introduction
information security planning and governance
information security policy, standards and practices
e.tc
RISK MANAGEMENT
introduction
an overview of risk management
risk identification
risk assessment
e.tc
SECURITY TECHNOLOGY: ACCESS CONTROLS, FIREWALLS AND VPNs
introduction
access control
firewalls
protecting remote connections
selected readings
e.tc
SECURITY TECHNOLOGY: INTRUSION DETECTION AND PREVENTION SYSTEMS AND OTHER SECURITY TOOLS
introduction
intrusion detection and prevention systems
honeypots, honeynets, and padded cell systems
e.tc
CRYPTOGRAPHY
introduction
foundations of cryptology
cipher methods
cryptographic algorithms
e.tc
PHYSICAL SECURITY
introduction
physical access controls
fire security and safety
e.tc
IMPLEMENTING INFORMATION SECURITY
introduction
information security project management
technical aspects of implementation
e.tc
SECURITY AND PERSONNEL
introduction
positioning and staffing the security function
nontechnical security professionals
e.tc
INFORMATION SECURITY MAINTENANCE
introduction
security management maintenance models
digital forensics
selected readings
e.tc
Includes Index. p 711-728
There are no comments on this title.