Management of Information Security, 6/e (IE-Paperback)【內含Access Code,經刮除不受退】
Michael E. Whitman , Herbert J. Mattord
This sixth edition of Management of Information Security tightens its focus on the managerial aspects of information security, continues to expand the coverage of governance and compliance issues, and continues to reduce the coverage of foundational and technical components. While retaining enough foundational material to allow reinforcement of key concepts, this edition has fewer technical examples. This edition also contains updated in-depth discussions and Offline features, and additional coverage in key managerial areas: risk management, information security governance, access control models, and information security program assessment and metrics.
The material on personnel management has been consolidated and reorganized. Personnel placement, staffing, and credentials are now covered in Chapter 5, and employment practices are discussed in Chapter 9. Digital forensics is now covered in Chapter 2.
In general, the entire text has been updated and re-organized to reflect changes in the field, including revisions to sections on national and international laws and standards, such as the ISO 27000 series, among others. Throughout the text, the content has been updated, with newer and more relevant examples and discussions. A complete coverage matrix of the topics in this edition is available to instructors to enable mapping of the previous coverage to the new structure. Please contact your sales representative for access to the matrix.
●CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALS (CISSP) AND CERTIFIED INFORMATION SECURITY MANAGERS (CISM) INFORMATION INTEGRATED THROUGHOUT. The authors have carefully incorporated both CISSP and CISM bodies of knowledge throughout the text to prepare your students for certification. Chapter scenarios follow a fictional company as it encounters various information security issues. Meaningful group discussion questions follow each scenario to prompt lively classroom dialogue and debate.
●WRITTEN BY SECURITY PROFESSIONALS. This text and its ancillary features were meticulously designed by security professionals who are also teaching faculty members. Their experiences and expertise from classroom and industry are woven throughout chapter content to provide instructors with a well-designed, comprehensive security management instructional tool, complete with modern virtual ancillaries and teaching support aids. The text reflects key industry trends and issues, while facilitating the organization, delivery and assessment of student knowledge.
●"VIEWPOINT" ESSAYS ILLUSTRATE INTRUIGING TOPICS. Written by security practitioners and academics, Viewpoint essays in each chapter use real-world examples to illustrate chapter concepts at work in today's business environments.
●ACTIVITIES, QUESTIONS AND PROJECTS REINFORCE SKILLS. Your students have numerous opportunities to apply what they are learning with in-depth review questions, hands-on activities and case projects in every chapter.
●EMPHASIS ON KEY EXECUTIVE AND MANAGERIAL ASPECTS OF INFORMATION SECURITY. As they progress through the text, students build on their strong foundation of key concepts and become proficient in the most important areas of information security and management.
1. Introduction to Management of Information Security
2. Compliance: Law and Ethics
3. Governance and Strategic Planning for Security
4. Information Security Policy
5. Developing the Security Program
6. Risk Management: Identifying and Assessing Risk
7. Risk Management: Controlling Risk
8. Security Management Models
9. Security Management Practices
10. Planning for Contingencies
11. Security Maintenance
12. Protection Mechanisms