did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780619216276

Readings And Cases in the Management of Information Security

by ;
  • ISBN13:

    9780619216276

  • ISBN10:

    0619216271

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2005-03-11
  • Publisher: Cengage Learning

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $199.95 Save up to $55.99
  • Rent Book $143.96
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.

Table of Contents

Part One Readings in the Management of Information Security
Mobile Device Security Management
2(6)
Benjamin J. Halpert
Linking Business Objectives and Security Directives
8(9)
Donald L. Pipkin
Managing Incident Response
17(16)
David M. Shackleford
Zen and the Art of Information Security---A Philosophical, Spiritual and Mystical Approach to Protecting Information
33(12)
Michael E. Whitman
Herbert J. Mattord
The Role of Information Security and Its Relationship to Information Technology Risk Management
45(17)
Chrisan Herrod
Architecting and Managing Secure Biometric Systems
62(13)
Kameswara Raonamuduri
Savitha S. Kadiyala
Integration and Ethical Perspectives for Information Systems Management
75(11)
Ernest A. Capozzoli
Robert D. Winsor
Sheb L. True
Security Education, Training, and Awareness from a Human Performance Technology Point of View
86(19)
Melissa J. Dark
The Provision of Defenses Against Internet-Based Attacks
105(15)
Li-Chiou Chen
Thomas A. Longstaff
Kathleen M. Carley
Trust, Controls, and Information Security
120(10)
Irene Woon
Atreyi Kankanhalli
Hierarchical Model of Organizational Work in the Sphere of Information Security
130(7)
Alexander Anisimov
Transparency in Information Security System Design
137
Herbert J. Mattord
Michael E. Whitman
Part Two Cases in the Management of Information Security
Computer Gaming Technologies---CGT Inc.
1(1)
Michael E. Whitman
Herbert J. Mattord
Assessing and Mitigating the Risks to a Hypothetical Computer System
1(1)
Random Widget Works
1(1)
Michael E. Whitman
Herbert J. Mattord
Sequential Label and Supply
1(1)
Herbert J. Mattord
Michael E. Whitman
Brightington Academy
1(1)
Michael E. Whitman
Herbert J. Mattord
The 9/11 Commission Report
1(1)
Herbert J. Mattord
Michael E. Whitman
Index 1

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program