Skip to:Content
|
Bottom
Cover image for MANAGEMENT OF INFORMATION SECURITY
Title:
MANAGEMENT OF INFORMATION SECURITY
Edition:
Second edition
Physical Description:
xxiii, 576 pages : illustrations ; 23 cm.
ISBN:
9781423901303
Abstract:
Provides an information security-driven topic coverage for the readers in the information technology and business fields alike. This work offers an overview of information security from a management perspective, as well as an understanding of the administration of information security.
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
33000000017082 T58.6 W45 2008 Open Access Book Gift Book
Searching...

On Order

Summary

Summary

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition so popular, and case studies and examples continue to populate the book, providing real-life applications for the topics covered.


Table of Contents

Section 1 Introduction
1 Introduction to Management of Information Security
Section 2 Planning
2 Planning for Security
3 Planning for Contingencies
Section 3 Policy and Programs
4 Security Policy
5 Developing the Security Program
6 Security Management Models and Practices
Section 4 Protection
7 Risk Management: Identifying and Assessing Risk
8 Risk Management: Assessing and Controlling Risk
9 Protection Mechanisms
Section 5 People and Projects
10 Personnel and Security
11 Law and Ethics
12 Information Security Project Management
Go to:Top of Page