
- English
- PDF
- Available on iOS & Android
Management of Information Security
About this book
MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title
- Statement
- Copyright
- Brief Contents
- Table of Contents
- Preface
- Chapter 1: Introduction to the Management of Information Security
- Chapter 2: Compliance: Law and Ethics
- Chapter 3: Governance and Strategic Planning for Security
- Chapter 4: Information Security Policy
- Chapter 5: Developing the Security Program
- Chapter 6: Risk Management: Assessing Risk
- Chapter 7: Risk Management: Treating Risk
- Chapter 8: Security Management Models
- Chapter 9: Security Management Practices
- Chapter 10: Planning for Contingencies
- Chapter 11: Security Maintenance
- Chapter 12: Protection Mechanisms
- Glossary
- Index