000 | 03556cam a22003375a 4500 | ||
---|---|---|---|
001 | 16926191 | ||
005 | 20161017155525.0 | ||
008 | 110818t2013 maua frb 001 0 eng d | ||
010 | _a 2011033490 | ||
020 | _a9780763793012 (pbk.) | ||
020 | _a0763793019 (pbk.) | ||
040 |
_aDLC _beng _cDLC _dEG-ScBUE |
||
082 | 0 | 4 |
_a658.478 _bWOR _222 |
100 | 1 |
_aWorkman, Michael D., _d1957- |
|
245 | 1 | 0 |
_aInformation security for managers / _cMichael Workman, Daniel C. Phelps, John N. Gathegi. |
260 |
_aBurlington : _bJones & Bartlett Learning, _cc.2013. |
||
300 |
_axxi, 593 p. : _bill. ; _c24 cm. |
||
500 | _aIndex : p. 555-593. | ||
504 | _aIncludes bibliographical references. | ||
505 | _aSection One: What Should Managers Know About Security: Policies and Procedures? 1. Introduction to Information Security --- 2. Corporations and the Rule of Law --- 3. Management, Security Law and Security Policies --- 4. Security Regulations and Governance --- 5. Security Programs, Risk Assessment and Management --- 6. Managing Organizational Security ---- Section Two: Technology Orientation for Managers. 7. Systems, Data, and Information --- 8. Programming Concepts --- 9. Applications Development --- 10. Computer Operating Systems --- 11. Networks and Addressing --- 12. Protocols and Routing ---- Section Three: Computer and Network Security. 13. Information Systems Security --- 14. Computer Security --- 15. Network Security --- 16. Cryptographic Uses and Firewalls --- 17. Cryptography Concepts --- 18. Web Applications Security ---- Section Four: Managing Organizations Securely. 19. Configuration Management --- 20. Managing Security Operations --- 21. Managing Security Behavior --- 22. Modeling and Predicting Security Attacks --- 23. Adaptive Systems Security --- 24. Security Horizons: Issues for Managers. | ||
520 | _aInformation systems have improved over the years to become more effective in collecting and rendering information for consumers, although these improvements have been accompanied by increases in both frequency and sophistication of attacks against them. The impacts from attacks against companies are significant, and managers are responsible for their organizations' security. Failures can cause significant losses to companies and their suppliers and clients, and may cost managers their jobs, and may even possibly lead to legal liabilities that are adjudicated against them. This textbook takes a different approach than most texts on the subject, which are organized topically. Pedagogically, Information Security for Managers utilizes an incremental development method called knowledge scaffolding -- a proven educational technique for learning subject matter thoroughly by reinforced learning through an elaborative rehearsal process. This new resource includes coverage on threats to confidentiality, integrity, and availability, as well as countermeasures to preserve these. The textbook also draws extensively from the latest applied research and development, rather than simply rehashing materials and topics that are in nearly all of the extant textbooks and popular reading materials. | ||
650 | 0 |
_aInformation technology _xSecurity measures. _2BUEsh |
|
650 | 0 |
_aComputer security _xManagement. _2BUEsh |
|
650 | 0 |
_aComputer networks _xSecurity measures. _2BUEsh |
|
650 | 0 |
_aBusiness enterprises _xSecurity measures. _2BUEsh |
|
651 | _2BUEsh | ||
653 |
_bCOMSCI _cOctober2016 |
||
700 | 1 | _aPhelps, Daniel C. | |
700 | 1 | _aGathegi, John Ng'ang'a. | |
942 | _2ddc | ||
999 |
_c22668 _d22640 |