The classic perpetrator of espionage or trespass is the hacker, who is frequently glamorized in fictional accounts as a person who stealthily manipulates a maze of computer networks, systems, and data to find information that solves the ...
This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series.
Information Security professionals, managers of IT employees, business managers, organizational security officers, network administrators, students or Business and Information Systems, IT, Accounting, Criminal Justice or IS majors.
Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management.
Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics.
Designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security, this work includes extensive end-of-chapter pedagogy to reinforce concepts as they are ...
Management of Information Security