買這商品的人也買了...
-
VB & VBA in a Nutshell: The Language (Paperback)$1,470$1,397 -
Fundamentals of Data Structures in C$1,050$1,029 -
Programming Pearls 中文版 (Programming Pearls, 2/e)$520$411 -
Microsoft Excel 2003 使用手冊$490$417 -
CCNA Self-Study: Interconnecting Cisco Network Devices (ICND) 640-811, 640-801, 2/e$2,220$2,109 -
Windows Forms Programming 使用 C# (Windows Forms Programming with C#)$720$562 -
Microsoft Word 2003 使用手冊$490$417 -
嵌入式系統導論, 3/e$760$646 -
軟體工程 (Software Engineering, 6/e)$750$593 -
Digital Electronics: A Practical Approach, 7/e$1,200$1,176 -
A First Course in the Finite Element Method, 3/e$550$539 -
深入淺出設計模式 (Head First Design Patterns)$880$695 -
$2,205The Java Programming Language, 4/e (Paperback) -
作業系統原理 (Silberschatz: Operating System Principles, 7/e)$780$741 -
鳥哥的 Linux 私房菜基礎學習篇, 2/e$780$663 -
PMP Exam Prep: Rita's Course in a Book for Passing the PMP Exam, 5/e$3,026$2,875 -
ASP.NET 2.0 深度剖析範例集$650$507 -
SQL 語法範例辭典$550$468 -
密碼學與網路安全(第四版) (Cryptography and Network Security: Principles and Practice, 4/e)$680$646 -
Linux 驅動程式, 3/e (Linux Device Drivers, 3/e)$980$774 -
802.11 無線網路技術通論 (802.11 Wireless Networks: The Definitive Guide, 2/e)$760$600 -
Visual C# 2005 建構資訊系統實戰經典教本$650$507 -
聖殿祭司的 ASP.NET 2.0 專家技術手冊─使用 C#$720$569 -
Microsoft Windows Server 2003 R2 架站實務$580$493 -
Engineering Mechanics - Statics, 6/e$1,080$1,058
相關主題
商品描述
Description
The real threat to information system security comes from people, not computers. That's why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data.
Addressing both the technical and human side of IS security, Dhillon's Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations.
Table of Contents
Preface.
Chapter 1. Information System Security: Nature and Scope.
PART I: TECHNICAL ASPECTS OF INFORMATION SYSTEM SECURITY.
Chapter 2. Security of Technical Systems in Organizations: an introduction.
Chapter 3. Models for Technical Specification of Information System Security.
Chapter 4. Cryptography and Technical Information System Security.
Chapter 5. Network Security.
PART II: FORMAL ASPECTS OF INFORMATION SYSTEM SECURITY.
Chapter 6. Security of Formal Systems in Organizations: an introduction.
Chapter 7. Planning for Information System Security.
Chapter 8. Designing Information System Security.
Chapter 9. Information System Risk Management.
PART III: INFORMAL ASPECTS OF INFORMATION SYSTEM SECURITY.
Chapter 10. Security of Informal Systems in Organizations: an introduction.
Chapter 11. Corporate Governance for IS Security.
Chapter 12. Culture and IS Security.
PART IV: REGULATORY ASPECTS OF INFORMATION SYSTEM SECURITY.
Chapter 13. Information System Security Standards.
Chapter 14. Legal Aspects of IS Security.
Chapter 15. Computer Forensics.
Chapter 16. Summary principles for Information System Security.
CASES.
Case 1: Case of a Computer Hack.
Case 2: Botnet: Anatomy of a Case.
Case 3: Cases in Computer Crime.
Case 4: IS Security at Southam Council.
Case 5: Security Management at the Tower.
Case 6: Computer crime and the demise of Barings Bank.
Case 7: Technology Enabled Fraud and the Demise of Drexel Burnham Lambert.
Case 8: It won’t part you hair: the INSLAW Affair.
Case 9: Taylor City Police Department Security Breach.
Case 10: Developing a Security Policy at M & M Procurement, Inc.
Index.
