
- English
- PDF
- Available on iOS & Android
Principles of Information Security
About this book
Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Title page
- Copyright page
- Brief Table of Contents
- Table of Contents
- Preface
- Chapter 1: Introduction to Information Security
- Chapter 2: The Need for Security
- Chapter 3: Legal, Ethical, and Professional Issues in Information Security
- Chapter 4: Planning for Security
- Chapter 5: Risk Management
- Chapter 6: Security Technology: Access Controls, Firewalls, and VPNs
- Chapter 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
- Chapter 8: Cryptography
- Chapter 9: Physical Security
- Chapter 10: Implementing Information Security
- Chapter 11: Security and Personnel
- Chapter 12: Information Security Maintenance
- Glossary
- Index