Principles of Information Security

"Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review term...

Full description

Saved in:
Bibliographic Details
Main Authors: Whitman, Michael E. 1964- (Author), Mattord, Herbert J. (Author)
Format: Book
Language:English
Published: Australia Cengage Learning 2018
Edition:Sixth Edition
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-969794
005 202129121328
008 210610t2018 AT a## ##001 #aeng#D
020 # # |a 9781337102063  |q paperback 
020 # # |a 1337102067  |q paperback 
040 # # |a DLC  |b eng  |d UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .W54 2018 
100 1 # |a Whitman, Michael E.  |d 1964-  |e author 
245 1 0 |a Principles of Information Security  |c Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP, Kennesaw State University. 
250 # # |a Sixth Edition 
264 # 1 |a Australia  |b Cengage Learning  |c 2018 
264 # 4 |c ©2018 
300 # # |a xx, 728 pages  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliograpical references and index. 
520 # # |a "Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers." -- Provided by publisher. 
526 0 # |a ICM662  |b IM249  |5 IM 
526 0 # |a INFORMATION SECURITY MANAGEMENT  |b BSC INFORMATION SCIENCE (HONS) (INFORMATION CONTENT MANAGEMENT)  |5 Faculty of Information Management 
650 # 0 |a Computer networks  |x Security measures 
650 # 0 |a Computer security 
700 1 # |a Mattord, Herbert J.  |e author 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=969794 
998 # # |a 00250##a006.2.2||00250##b006.2.2||00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00520##a006.2.2||00520##b006.2.2||