Principles of Information Security

Front Cover
Cengage Learning EMEA, 2009 - Computers - 598 pages
Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.
 

What people are saying - Write a review

User ratings

5 stars
5
4 stars
0
3 stars
2
2 stars
1
1 star
3

Principles of Information Security

User Review  - elementaljim - Overstock.com

This book is required for a class that I am taking for a Masters of Science through a noteable University. This text has many grammatical errors. It is not an easy read. The chapters are too long. I ... Read full review

User Review - Flag as inappropriate

Great literature for research review in the field of privacy

All 6 reviews »

Contents

II
1
III
3
V
4
VI
5
VII
7
VIII
8
IX
9
XI
10
CCXV
260
CCXVI
264
CCXVIII
274
CCXIX
275
CCXX
279
CCXXI
283
CCXXIII
284
CCXXIV
285

XIV
12
XVI
13
XVIII
14
XIX
15
XXII
16
XXV
17
XXVII
18
XXVIII
20
XXX
21
XXXIII
22
XXXVII
25
XXXIX
26
XLIII
27
XLIV
28
XLVI
29
XLVIII
30
LII
31
LV
32
LVII
33
LIX
34
LXI
37
LXII
38
LXIV
39
LXVII
40
LXVIII
42
LXIX
43
LXX
45
LXXI
51
LXXIII
54
LXXVI
59
LXXVII
61
LXXVIII
62
LXXIX
63
LXXX
65
LXXXV
66
LXXXVI
67
LXXXVIII
68
XC
69
XCII
72
XCIII
73
XCVI
74
XCVII
75
XCVIII
81
C
82
CI
83
CIII
87
CIV
88
CVI
89
CVIII
90
CXI
91
CXII
95
CXIII
96
CXIV
97
CXVIII
98
CXX
99
CXXIII
100
CXXIV
101
CXXVII
104
CXXVIII
105
CXXX
107
CXXXI
108
CXXXII
111
CXXXIII
112
CXXXV
113
CXXXVII
115
CXXXVIII
116
CXXXIX
117
CXL
118
CXLIII
119
CXLIV
120
CXLV
124
CXLVI
125
CXLVII
128
CXLVIII
129
CXLIX
133
CL
138
CLI
139
CLII
140
CLIV
141
CLV
143
CLVI
145
CLIX
146
CLX
147
CLXI
149
CLXIII
151
CLXV
154
CLXVII
155
CLXVIII
160
CLXIX
162
CLXXI
163
CLXXII
164
CLXXIII
165
CLXXV
166
CLXXVI
167
CLXXVII
168
CLXXVIII
172
CLXXX
174
CLXXXI
175
CLXXXII
177
CLXXXIII
180
CLXXXIV
184
CLXXXV
186
CLXXXVI
187
CLXXXVII
192
CLXXXVIII
198
CLXXXIX
200
CXC
201
CXCI
206
CXCII
207
CXCIV
208
CXCV
209
CXCVI
212
CXCVII
215
CXCVIII
228
CXCIX
229
CC
232
CCI
233
CCII
235
CCIII
237
CCV
238
CCVI
239
CCVII
240
CCVIII
243
CCIX
244
CCXI
245
CCXIII
251
CCXIV
252
CCXXVI
287
CCXXVII
289
CCXXIX
290
CCXXX
291
CCXXXI
293
CCXXXII
301
CCXXXIII
306
CCXXXIV
311
CCXXXV
312
CCXXXVI
318
CCXXXVII
320
CCXXXVIII
322
CCXXXIX
323
CCXLI
326
CCXLII
327
CCXLIII
328
CCXLV
335
CCXLVI
336
CCXLVII
338
CCXLIX
341
CCL
342
CCLI
343
CCLIII
344
CCLIV
345
CCLVI
349
CCLVII
350
CCLVIII
351
CCLIX
354
CCLXI
355
CCLXII
359
CCLXIII
360
CCLXIV
362
CCLXV
363
CCLXVII
364
CCLXIX
368
CCLXX
373
CCLXXI
375
CCLXXII
377
CCLXXIII
378
CCLXXIV
380
CCLXXV
381
CCLXXVI
382
CCLXXVIII
383
CCLXXIX
385
CCLXXXI
388
CCLXXXII
391
CCLXXXIV
392
CCLXXXVII
393
CCXC
394
CCXCI
395
CCXCII
396
CCXCIII
399
CCXCIV
401
CCXCV
402
CCXCVII
410
CCXCIX
417
CCC
418
CCCI
419
CCCII
423
CCCIII
424
CCCVI
425
CCCVII
427
CCCVIII
428
CCCIX
429
CCCX
430
CCCXII
431
CCCXIII
432
CCCXV
435
CCCXVI
437
CCCXVIII
438
CCCXIX
443
CCCXX
445
CCCXXII
447
CCCXXIV
448
CCCXXV
450
CCCXXVII
451
CCCXXIX
452
CCCXXX
453
CCCXXXIII
457
CCCXXXIV
462
CCCXXXV
464
CCCXXXVII
465
CCCXXXVIII
466
CCCXXXIX
467
CCCXL
469
CCCXLI
471
CCCXLIII
473
CCCXLIV
479
CCCXLV
480
CCCXLVI
483
CCCXLVII
484
CCCXLVIII
486
CCCXLIX
488
CCCLI
489
CCCLIII
490
CCCLIV
491
CCCLV
492
CCCLVI
493
CCCLIX
495
CCCLXII
496
CCCLXIV
498
CCCLXVI
499
CCCLXVIII
500
CCCLXX
502
CCCLXXII
503
CCCLXXIII
504
CCCLXXIV
505
CCCLXXVI
509
CCCLXXVII
510
CCCLXXVIII
511
CCCLXXIX
512
CCCLXXX
519
CCCLXXXI
520
CCCLXXXII
526
CCCLXXXIII
530
CCCLXXXIV
536
CCCLXXXV
544
CCCLXXXVI
546
CCCLXXXVII
547
CCCLXXXIX
548
CCCXC
556
CCCXCI
557
CCCXCIII
558
CCCXCIV
559
CCCXCVI
561
CCCXCVII
585
Copyright

Other editions - View all

Common terms and phrases

About the author (2009)

Michael Whitman, Ph.D., CISM, CISSP, is Professor of Information Security at Kennesaw State University, Kennesaw, Georgia. He also serves as the Executive Director of the Center for Information Security Education, Coles College of Business. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU's successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Journal of Cybersecurity Education, Research and Practice, and is Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, Curriculum Development, and Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INFORMATION SECURITY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; and THE GUIDE TO NETWORK SECURITY AND THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an Automated Data Processing System Security Officer (ADPSSO).

Herbert Mattord, Ph.D., CISM, CISSP, completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security and Assurance as well as Information Systems. He and Michael Whitman have authored PRINCIPLES OF INFORMATION SECURITY, MANAGEMENT OF INFORMATION SECURITY, READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY, THE GUIDE TO NETWORK SECURITY, and THE HANDS-ON INFORMATION SECURITY LAB MANUAL, Dr. Mattord is an active researcher, author, and consultant in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge found in this and his other textbooks.

Bibliographic information