๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Principles of Information Security

โœ Scribed by Michael E. Whitman, Herbert J. Mattord


Publisher
Cengage Learning
Year
2014
Tongue
English
Leaves
722
Edition
5
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this bestseller teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program.

Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers.


๐Ÿ“œ SIMILAR VOLUMES


Principles of Information Security
โœ Michael E. Whitman, Herbert J. Mattord ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Course Technology ๐ŸŒ English

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information securi

Principles of information security
โœ Mattord, Herbert J.;Whitman, Michael E ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Cengage Learning ๐ŸŒ English

Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this market-leading introductory book teaches all the aspects of information security-not just the