By Michael E. Whitman

Administration of data safety, Fourth variation provides readers an outline of knowledge safety and coverage utilizing either family and foreign criteria, all from a administration viewpoint. starting with the foundational and technical elements of data safety, this variation then makes a speciality of entry keep watch over types, details safety governance, and knowledge defense software review and metrics.The Fourth variation is revised and up to date to mirror alterations within the box, together with the ISO 27000 sequence, in order to organize readers to achieve the place of work.

Show description

Read or Download Management of Information Security PDF

Similar network security books

IPSec (2nd Edition)

IPSec, moment version is the main authoritative, entire, available, and updated advisor to IPSec expertise. best gurus hide all aspects of IPSec structure, implementation, and deployment; evaluation vital technical advances considering the fact that IPSec used to be first standardized; and current new case reviews demonstrating end-to-end IPSec safety.

A Survey of Data Leakage Detection and Prevention Solutions

SpringerBriefs current concise summaries of state-of-the-art study and useful purposes throughout a large spectrum of fields. that includes compact volumes of fifty to a hundred pages (approximately 20,000- 40,000 words), the sequence covers a number of content material from specialist to educational. Briefs enable authors to offer their rules and readers to soak up them with minimum time funding.

Unified Communications Forensics. Anatomy of Common UC Attacks

Unified Communications Forensics: Anatomy of universal UC assaults is the 1st ebook to give an explanation for the problems and vulnerabilities and reveal the assaults, forensic artifacts, and countermeasures required to set up a safe (UC) setting. This e-book is written through best UC specialists Nicholas furnish and Joseph W.

CCSP Self-Study CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide

Community protection is a really complicated company. The Cisco snap shots Firewall plays a few very particular services as a part of the safety strategy. it is important to to be accustomed to many networking and community protection techniques earlier than you adopt the CSPFA certification. This ebook is designed for defense execs or networking execs who're drawn to starting the protection certification technique.

Extra resources for Management of Information Security

Sample text

In general, security is the quality or state of being secure—being free from danger. To be secure is to be protected from the risk of loss, damage, or unwanted modification, or other hazards. National security, for example, is a system of multilayered processes that protects the sovereignty of a state—its assets, resources, and people. Achieving an appropriate level of security for an organization also depends on the implementation of a multilayered system. Copyright 2013 Cengage Learning. All Rights Reserved.

The two basic approaches to management are: ● Traditional management theory—This approach uses the core principles of planning, organizing, staffing, directing, and controlling (POSDC). ● Popular management theory—This approach uses the core principles of planning, organizing, leading, and controlling (POLC). The traditional approach to management theory is often well covered in introductory business courses and will not be revisited here. Rather, we will focus on the POLC principles that managers employ when dealing with tasks.

Scope creep occurs when the quantity or quality of project deliverables is expanded from the original project plan.

Download PDF sample

Rated 4.20 of 5 – based on 16 votes