Principles of information security / Michael E. Whitman and Herbert J. Mattord
Material type:
- 619216255
- TK 5105.59 .W45 2005

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC TK 5105.59 .W45 2005 (Browse shelf(Opens below)) | c.1 | Available | NULIB000002062 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
No cover image available | ||
GC TK 5105.59 .R48 2012 c.2 Reverse deception : organized cyber threat counter-exploitation / | GC TK 5105.59 .S54 2014 c.1 Anti-hacker tool kit / | GC TK 5105.59 .S54 2014 c.2 Anti-hacker tool kit / | GC TK 5105.59 .W45 2005 Principles of information security / | GC TK 5105.59 .W45 2014 Management of information security / | GC TK 5105.875.I57 .G39 2021 Practical threat intelligence and data-driven thread hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source tools / | GC TK 5105.888 .J66 2022 UX/UI Design 2022 : a comprehensive UI & UX guide to master web design and mobile app sketches for beginners and pros / |
Includes index.
Introduction to information security -- Need for security -- Legal, ethical, and professional issues in information security -- Risk management -- Planning for security -- Security technology, firewalls and VPNs -- Security technology, intrusion detection, access control, and other security tools -- Cryptography -- Physical security -- Implementing information security -- Security and personnel -- Information security maintenance --
Utilizing a foundations approach, [this book] provides information systems students with a thorough examination of the field of information security to prepare them for their role as eventual business decision makers. With extensive opportunity for hands-on work, the authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and tools such as "Offline" boxes with interesting stories in each chapter. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. Other topics include legal and ethical issues in Information Security, Risk Management, Network and System Security, Cryptography, and the Information Security Maintenance.
There are no comments on this title.