Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 33000000017082 | T58.6 W45 2008 | Open Access Book | Gift Book | Searching... |
On Order
Summary
Summary
Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition so popular, and case studies and examples continue to populate the book, providing real-life applications for the topics covered.
Table of Contents
Section 1 Introduction |
1 Introduction to Management of Information Security |
Section 2 Planning |
2 Planning for Security |
3 Planning for Contingencies |
Section 3 Policy and Programs |
4 Security Policy |
5 Developing the Security Program |
6 Security Management Models and Practices |
Section 4 Protection |
7 Risk Management: Identifying and Assessing Risk |
8 Risk Management: Assessing and Controlling Risk |
9 Protection Mechanisms |
Section 5 People and Projects |
10 Personnel and Security |
11 Law and Ethics |
12 Information Security Project Management |