Information Security Management Principles

Information Security Management Principles
ISBN-10
1780171757
ISBN-13
9781780171753
Series
Information Security Management Principles
Category
Computers
Pages
220
Language
English
Published
2013
Publisher
BCS, The Chartered Institute for IT
Authors
David Alexander, Andy Taylor, David Sutton

Description

In today’s technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The second edition includes the security of cloud-based resources and the contents have been revised to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports.

Other editions

Similar books

  • Principles of Information Security
    By Michael E. Whitman, Herbert J. Mattord

    McDonald's Corporation Online. 15 April 2002. Accessed 9 February 2014 from www.csrwire.com/press_releases/25172-McDonald-s-Issues-First-Worldwide-SocialResponsibility-Report. 21. Peters, Thomas J., and Waterman, Robert H. In Search of ...

  • Principles of Information Security
    By Michael E. Whitman, Herbert J. Mattord

    Designed specifically to meet the needs of those studying information systems, this edition's balanced focus addresses all aspects of information security, rather than simply offering a technical control perspective.

  • Information Security: Principles and Practices
    By Mark S. Merkow, Jim Breithaupt

    This edition addresses today's newest trends, from cloud and mobile security to BYOD and the latest compliance requirements. The authors present updated real-life case studies, review questions, and exercises throughout.

  • Information Security: Principles and Practice
    By Mark Stamp

    The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: ...

  • Management of Information Security
    By Michael E. Whitman, Herbert J. Mattord

    The classic perpetrator of espionage or trespass is the hacker, who is frequently glamorized in fictional accounts as a person who stealthily manipulates a maze of computer networks, systems, and data to find information that solves the ...

  • Information Security Management Handbook, Sixth Edition
    By James S. Tiller, Richard O'Hanley

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance.

  • Computers at Risk: Safe Computing in the Information Age
    By Mathematics, National Research Council, Division on Engineering and Physical Sciences

    The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced ...

  • Information Security Management: Global Challenges in the New Millennium
    By Dhillon, Gurpreet

    Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

  • Principles and Practice of Information Security: Protecting Computers from Hackers and Lawyers
    By Linda Volonino, Stephen R. Robinson, Charles P. Volonino

    This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers...

  • CISSP: Certified Information Systems Security Professional Study Guide
    By Ed Tittel, Mike Chapple, James Michael Stewart

    CISSP certification identifies the ultimate IT security professional; this complete study guide is fully updated to cover all the objectives of the 2011 CISSP exam Provides in-depth knowledge of access control, application development ...