Principles Of Information Security

Principles Of Information Security Learn About Them

Principles Of Information Security Learn About Them. Present state-of-the-art technologies and innovations compiled in the 6th edition.


Principles Of Information Security Learn About Them. Present state-of-the-art technologies and innovations of the book. This is especially for students of IS the concepts of ISS. This leading introductory book based on a management perspective. Further, illustrates every aspect of information protection—not merely the technological control point of view.

Moreover, to ensure comprehension, the students get a detailed description of the whole area of information management and associated elements. Students study the terminology used in the industry, history, and the way they handle an information security program.

This edition highlights existing and applicable alternative approaches with fresh examples. Furthermore, discuss the implications of digital technologies such as the Internet of Things, cloud computing, and DevOps. Finally, updates technical access measures, new regulatory challenges, digital forensics, and ethical questions in the security of IS.

What’s new in this edition?

Contents revised with new evolution.

With revised examples and sources, the students discuss new scientific and analytical developments. Moreover, this version guarantees that you have the best coverage on emerging topics.

Refined language on security risks to records.

A contemporary interpretation and a rational method of the text maintained the revised meanings. Besides, an up-to-date structure in keywords is better. Moreover, refined threat coverage and assault with added insight into the extent and severity of risks and reorganized coverage of IT attacks helps train students for safety challenges.

Update access controls for technological security.

Students examine whether the new control environment transitions to a climate of less emphasis on the network periphery. And more trust in cloud infrastructure and the Internet.

About the writers

Whitman Michael E.

Professor in Information Technology at Kennesaw State University, Kennesaw, CISSP, CISSP Michael Whitman, Ph.D., Kennesaw, Georgia. He is also Executive Director, Coles College of Business, Hub of Information Security Education. The competitive KSU bid for prestigious National Center for Academic Excellence Awards (CAE/IAE, and IA/CDE) awarded together by the Homeland Security Department and the National Security Agency, under its leadership, was led during 2004, 2007, 2012, and 2015 by the Center for Information Security Education. Dr. Whitman currently serves as Editor-Chief of the Journal for Curriculum Study and Practice for Cybersecurity and is Head of the Cyber Safety Competition Southeast Collegiate. Dr. Whitman has been interested in research, challenges, program implementation, and ethical computation in information technology policy. He currently offers information technology graduate and undergraduate classes.

Mattord Herbert J.

Before entering the faculty of the Departments for IS and the Associate Professor of Information Technology and Assurance, Herbert Mattord, Ph.D., CISM, CISSP, has completed 24 years of IT business expertise in program developer, network administrator, project management, and information security practitioners. Moreover, Dr. Mattord currently offers both graduate and professional information management, insurance, and computer technology courses. Further, Dr. Mattord is an experienced scholar, writer, and consultant on ISM and similar subjects. In his travels, he has written articles in the Journal of Knowledge Security, in the Journal of Information Securité Education, and the Journal of Executive Education. Finally, Dr. Mattord is ISACA member of the Organization for Computer Systems Security.

[Total: 0   Average: 0/5]

Leave a Comment

Your email address will not be published.