Skip to content

Readings and Cases in the Management of Information Security

Best in textbook rentals since 2012!

ISBN-10: 0619216271

ISBN-13: 9780619216276

Edition: 2006

Authors: Michael E. Whitman, Herbert J. Mattord

List price: $199.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.
Customers also bought

Book details

List price: $199.95
Copyright year: 2006
Publisher: Course Technology
Publication date: 3/11/2005
Binding: Mixed Media
Pages: 272
Size: 7.25" wide x 9.00" long x 0.75" tall
Weight: 1.034
Language: English

Michael E. Whitman, Ph.D, CISM, CISSP, is a professor of information security and director of the Coles Center for Information Security Education at Kennesaw State University (KSU) in Kennesaw, GA. With over 12 years of experience designing and implementing information security curriculum and over 20 years of experience teaching and researching at the university level, Dr. Whitman has served as a consultant to several Fortune 1000 organizations, the United States Government, and the State of Georgia on issues related to information security. He has authored several textbooks in information security including Principles of Information Security and Management of Information Security,…    

Herbert J. Mattord, Ph.D, CISM, CISSP, teaches courses in Information Security and Assurance at Kennesaw State University (KSU) in Kennesaw, GA. He is the associate director of the KSU Center for Information Security Education (infosec.kennesaw.edu), as well as the coordinator for the KSU Information Security and Assurance and Information Systems programs of study. He completed 26 years of IT industry experience before becoming a full-time academic in 2002. His experiences as an application developer, database administrator, project manager, and information security practitioner are a valuable background to his teaching role at KSU. While engaged in his IT career, he worked as an adjunct…    

Readings in the Management of Information Security
Mobile Device Security Management
Linking Business Objectives and Security Directives
Managing Incident Response
Zen and the Art of Information Security-A Philosophical, Spiritual and Mystical Approach to Protecting Information
The Role of Information Security and Its Relationship to Information Technology Risk Management
Architecting and Managing Secure Biometric Systems
Integration and Ethical Perspectives for Information Systems Management
Security Education, Training, and Awareness from a Human Performance Technology Point of View
The Provision of Defenses Against Internet-Based Attacks
Trust, Controls and Information Security
Hierarchical Model of Organizational Work in the Sphere of Information Security
Transparency in Information Security System Design
Cases in the Management of Information Security
Computer Gaming Technologies-CGT Inc.
Assessing and Mitigating the Risks to a Hypothetical Computer System, National Institute of Standards and Technology (NIST); Technology Administration; U.S. Department of Commerce
Random Widget Works
Sequential Label and Supply
Brightington Academy
The 9/11 Commission Report