Skip to content

Management of Information Security

Best in textbook rentals since 2012!

ISBN-10: 1435488849

ISBN-13: 9781435488847

Edition: 3rd 2011

Authors: Michael E. Whitman, Herbert J. Mattord

List price: $205.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $205.95
Edition: 3rd
Copyright year: 2011
Publisher: Course Technology
Publication date: 1/19/2010
Binding: Paperback
Pages: 592
Size: 7.00" wide x 9.00" long x 1.25" tall
Weight: 2.090
Language: English

Michael E. Whitman, Ph.D, CISM, CISSP, is a professor of information security and director of the Coles Center for Information Security Education at Kennesaw State University (KSU) in Kennesaw, GA. With over 12 years of experience designing and implementing information security curriculum and over 20 years of experience teaching and researching at the university level, Dr. Whitman has served as a consultant to several Fortune 1000 organizations, the United States Government, and the State of Georgia on issues related to information security. He has authored several textbooks in information security including Principles of Information Security and Management of Information Security,…    

Herbert J. Mattord, Ph.D, CISM, CISSP, teaches courses in Information Security and Assurance at Kennesaw State University (KSU) in Kennesaw, GA. He is the associate director of the KSU Center for Information Security Education (infosec.kennesaw.edu), as well as the coordinator for the KSU Information Security and Assurance and Information Systems programs of study. He completed 26 years of IT industry experience before becoming a full-time academic in 2002. His experiences as an application developer, database administrator, project manager, and information security practitioner are a valuable background to his teaching role at KSU. While engaged in his IT career, he worked as an adjunct…    

Introduction
Introduction to Management of Information Security
Planning
Planning for Security
Planning for Contingencies
Policy And Programs
Security Policy
Developing Security Programs
Security Management Models
Security Management Practices
Protection
Risk Assessment
Controlling Risk
Protection Mechanisms
People
Personnel and Security
Law and Ethics
NIST SP 800-26, Security Self-Assessment Guide for Information
Technology Systems and ISO 27002 Questionnaire
Risk Management Models