Principles of Information Security
Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security -- not jus...
Saved in:
Main Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Australia
Cengage Learning
2018
|
Edition: | Sixth edition |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000 i 4501 | ||
---|---|---|---|
001 | wils-950417 | ||
005 | 201981915326 | ||
008 | 190919t2018 AT ag| |#001 ##eng#D | ||
020 | # | # | |a 9789387994232 |q paperback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .W54 2018 |
100 | 1 | # | |a Whitman, Michael E. |e author |
245 | 0 | 0 | |a Principles of Information Security |c Michael E. Whitman, Whitman Ma |
250 | # | # | |a Sixth edition |
264 | # | 1 | |a Australia |b Cengage Learning |c 2018 |
264 | # | 4 | |c ©2018 |
300 | # | # | |a 728 pages : |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references and indexes |
520 | # | # | |a Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security -- not just the technical control perspective. Students gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. Students review terms used in the field, a history of the discipline, and an overview of how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making it ideal for business decision-makers. |
526 | 0 | # | |a IMS605 |b IM245 |5 IM |
526 | 0 | # | |a Data Center Operational And Services |b Bachelor of Information Science (Hons) Information Systems Management |5 Faculty of Information Management |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Computer security |
700 | 1 | # | |a Mattord, Herbert J. |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=950417 |
998 | # | # | |a 00250##a006.2.2||00250##b006.2.2||00255##a006.2.2||00260##a006.2.2||00260##b006.2.2||00260##c006.2.2||00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00500##a006.2.2||00502##a006.2.2||00520##a006.2.2||00520##b006.2.2||00538##a006.2.2||00546##a006.2.2||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2|| |