Download Principles of Information Security by Michael E. Whitman PDF

By Michael E. Whitman

In particular orientated to the wishes of knowledge structures scholars, rules of knowledge safety, 5e promises the newest know-how and advancements from the sphere. Taking a managerial process, this bestseller teaches all of the features of knowledge security-not simply the technical keep watch over point of view. It presents a wide assessment of the complete box of data defense, heritage on many similar parts, and sufficient element to facilitate knowing of the subject. It covers the terminology of the sphere, the heritage of the self-discipline, and an outline of ways to regulate a knowledge defense program.

Current and appropriate, the 5th version contains the newest practices, clean examples, up to date fabric on technical defense controls, rising legislative matters, new insurance of electronic forensics, and hands-on software of moral concerns in IS protection. it's the final source for destiny company decision-makers.

Show description

Read or Download Principles of Information Security PDF

Best network security books

Guide to Computer Forensics and Investigations (3rd Edition)

Grasp the talents essential to release and entire a profitable machine research with the up-to-date fourth version of this renowned e-book, advisor TO laptop FORENSICS AND INVESTIGATIONS. This source publications readers via accomplishing a high-tech research, from buying electronic facts to reporting its findings.

The Executive MBA in Information Security

Based on the Brookings Institute, an organization’s details and different intangible resources account for over eighty percentage of its marketplace price. because the basic sponsors and implementers of knowledge safeguard courses, it truly is crucial for these in key management positions to own a superior realizing of the continuously evolving primary thoughts of data safeguard administration.

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Community protection has develop into an incredible a part of company IT technique and safeguarding all of the nooks and crannies of your community might be well timed and costly. This e-book presents information regarding how you can use unfastened Open resource instruments to construct and deal with an Intrusion Detection process. Rehman presents special information regarding utilizing giggle as an IDS and utilizing Apache, MySQL, Hypertext Preprocessor and ACID to research intrusion information.

Information Security and Cryptology -- ICISC 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

This ebook constitutes the completely refereed post-conference complaints of the sixteenth foreign convention on details defense and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised complete papers offered including 2 invited talks have been conscientiously chosen from 126 submissions in the course of rounds of reviewing.

Additional info for Principles of Information Security

Example text

She assigned the newly generated case to the user dispatch queue, which would page the roving user support technician with the details in a few minutes. A moment later, Amy looked up to see Charlie Moody, the senior manager of the server administration team, walking briskly down the hall. He was being trailed by three of his senior technicians as he made a beeline from his office to the room where the company servers were kept in a carefully controlled environment. They all looked worried. Just then, Amy’s screen beeped to alert her of a new e-mail.

Threat A category of objects, people, or other entities that represents a danger to an asset. Threats are always present and can be purposeful or undirected. For example, hackers purposefully threaten unprotected information systems, while severe storms incidentally threaten buildings and their contents. ● Threat agent The specific instance or a component of a threat. For example, the threat of “trespass or espionage” is a category of potential danger to information assets, while “external professional hacker” (like Kevin Mitnick, who was convicted of hacking into phone systems) is a specific threat agent.

For example, timeliness of information can be a critical factor because information loses much or all of its value when delivered too late. Though information security professionals and end users share an understanding of the characteristics of information, tensions can arise when the need to secure information from threats conflicts with the end users’ need for unhindered access to it. 1-second delay in the computation of data to be an unnecessary annoyance. 1 seconds as a minor delay that enables an important task, like data encryption.

Download PDF sample

Rated 4.68 of 5 – based on 48 votes