Principles of Information Security
"Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review term...
Saved in:
Main Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Australia
Cengage Learning
2018
|
Edition: | Sixth Edition |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-969794 | ||
005 | 202129121328 | ||
008 | 210610t2018 AT a## ##001 #aeng#D | ||
020 | # | # | |a 9781337102063 |q paperback |
020 | # | # | |a 1337102067 |q paperback |
040 | # | # | |a DLC |b eng |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .W54 2018 |
100 | 1 | # | |a Whitman, Michael E. |d 1964- |e author |
245 | 1 | 0 | |a Principles of Information Security |c Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University. |
250 | # | # | |a Sixth Edition |
264 | # | 1 | |a Australia |b Cengage Learning |c 2018 |
264 | # | 4 | |c ©2018 |
300 | # | # | |a xx, 728 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliograpical references and index. |
520 | # | # | |a "Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers." -- Provided by publisher. |
526 | 0 | # | |a ICM662 |b IM249 |5 IM |
526 | 0 | # | |a INFORMATION SECURITY MANAGEMENT |b BSC INFORMATION SCIENCE (HONS) (INFORMATION CONTENT MANAGEMENT) |5 Faculty of Information Management |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Computer security |
700 | 1 | # | |a Mattord, Herbert J. |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=969794 |
998 | # | # | |a 00250##a006.2.2||00250##b006.2.2||00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00520##a006.2.2||00520##b006.2.2|| |