
- 546 pages
- English
- PDF
- Available on iOS & Android
Management of Cybersecurity
About this book
Whitman/Mattord's "Management of Cybersecurity" 7th Edition, prepares you to become a cybersecurity management practitioner able to secure systems and networks against emerging threats, persistent attacks and the advanced expertise of cybercriminals, addressing weaknesses in current information technologies. You'll develop cybersecurity skills and practical experience that organizations seek to ensure more secure computing environments. The text focuses on key cybersecurity executive and managerial aspects, integrating Certified Information Systems Security Professionals (CISSP) and Certified Information Security Managers (CISM) to prepare you for certification. Recent developments include the latest information on NIST, ISO and security governance, addressing issues like ransomware, cloud computing and the Internet of Things as well as concerns like blockchain and AI.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Brief Contents
- Contents
- Foreword
- Preface
- Chapter 1: Introduction to the Management of Cybersecurity
- Chapter 2: Governance and Strategic Planning for Cybersecurity
- Chapter 3: Risk Management: Assessing Risk
- Chapter 4: Risk Management: Treating Risk
- Chapter 5: Compliance: Law and Ethics
- Chapter 6: Cybersecurity Policy
- Chapter 7: Developing the Cybersecurity Program
- Chapter 8: Cybersecurity Management Models
- Chapter 9: Cybersecurity Management Practices
- Chapter 10: Planning for Contingencies
- Chapter 11: Cybersecurity Maintenance
- Chapter 12: Cybersecurity Protection Mechanisms
- Glossary
- Endnotes
- Index