Amazon cover image
Image from Amazon.com

Management of information security / Michael E. Whitman and Herbert J. Mattord

By: Contributor(s): Material type: TextTextPublication details: Australia : Cengage Learning Asia Pte Ltd, c2014Edition: Fourth EditionDescription: xiv, 566 pages : illustrations ; 25 cmISBN:
  • 9781285062297
Subject(s): LOC classification:
  • TK 5105.59 .W45 2014
Contents:
1. Introduction to Management of Information Security -- 2. Planning for Security -- 3. Planning for Contingencies -- 4. Information Security Policy -- 5. Developing the Security Program -- 6. Security Management Models -- 7. Security Management Practices -- 8. Risk Management: Identifying and Assessing Risk -- 9. Risk Management: Controlling Risk -- 10. Protection Mechanisms -- 11. Personnel and Security -- 12. Law and Ethics.
Summary: Beginning with the foundational and technical components of information security, this title focuses on access control models, information security governance, and information security program assessment and metrics.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Main General Circulation Digital Forensic GC TK 5105.59 .W45 2014 (Browse shelf(Opens below)) c.1 Available NULIB000012159

Includes index.

1. Introduction to Management of Information Security -- 2. Planning for Security -- 3. Planning for Contingencies -- 4. Information Security Policy -- 5. Developing the Security Program -- 6. Security Management Models -- 7. Security Management Practices -- 8. Risk Management: Identifying and Assessing Risk -- 9. Risk Management: Controlling Risk -- 10. Protection Mechanisms -- 11. Personnel and Security -- 12. Law and Ethics.

Beginning with the foundational and technical components of information security, this title focuses on access control models, information security governance, and information security program assessment and metrics.

There are no comments on this title.

to post a comment.