
- English
- PDF
- Available on iOS & Android
Principles of Information Security
About this book
Discover the latest trends, developments and technology in information security with Whitman/Mattord's market-leading PRINCIPLES OF INFORMATION SECURITY, 7th Edition. Designed specifically to meet the needs of information systems students like you, this edition's balanced focus addresses all aspects of information security, rather than simply offering a technical control perspective. This overview explores important terms and examines what is needed to manage an effective information security program. A new module details incident response and detection strategies. In addition, current, relevant updates highlight the latest practices in security operations as well as legislative issues, information management toolsets, digital forensics and the most recent policies and guidelines that correspond to federal and international standards. MindTap digital resources offer interactive content to further strength your success as a business decision-maker.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Brief Contents
- Table of Contents
- Preface
- Module 1: Introduction to Information Security
- Module 2: The Need for Information Security
- Module 3: Information Security Management
- Module 4: Risk Management
- Module 5: Incident Response and Contingency Planning
- Module 6: Legal, Ethical, and Professional Issues in Information Security
- Module 7: Security and Personnel
- Module 8: Security Technology: Access Controls, Firewalls, and VPNs
- Module 9: Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools
- Module 10: Cryptography
- Module 11: Implementing Information Security
- Module 12: Information Security Maintenance
- Glossary
- Index