Principles of Information Security 6th edition by Michael Whitman, Herbert Mattord – Ebook PDF Instant Download/Delivery. 1337102067 978-1337102063
Full download Principles of Information Security 6th edition after payment

Product details:
ISBN 10: 1337102067
ISBN 13: 978-1337102063
Author: Michael Whitman, Herbert Mattord
Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you — PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.
Principles of Information Security 6th Table of contents:
Preface
- Overview of the Book
- How to Use This Book
- Key Features
- Audience
Chapter 1: The Importance of Information Security
1.1. The Evolving Role of Information Security
1.2. What Is Information Security?
1.3. The Impact of Information Security Breaches
1.4. The Need for Effective Security Programs
1.5. Information Security Trends and Issues
1.6. The History of Information Security
1.7. The Information Security Landscape
Chapter 2: The Threat Environment
2.1. Types of Threats
2.2. Hackers and Their Motivations
2.3. Organized Crime and Cybercrime
2.4. Nation-States and Cyber Warfare
2.5. Insider Threats
2.6. The Role of Social Engineering
2.7. Emerging Threats
Chapter 3: Risk Management and Assessment
3.1. What Is Risk?
3.2. Risk Management Process
3.3. Identifying and Assessing Risk
3.4. Risk Mitigation Strategies
3.5. Risk Analysis and Assessment Tools
3.6. The Role of Insurance in Risk Management
Chapter 4: Legal, Ethical, and Professional Issues in Information Security
4.1. Legal Foundations for Information Security
4.2. Privacy Laws and Regulations
4.3. Ethical Issues in Information Security
4.4. Professional Security Standards and Codes of Conduct
4.5. International Information Security Laws
4.6. Digital Forensics and Legal Evidence
Chapter 5: Security Governance and Compliance
5.1. Governance Frameworks and Models
5.2. The Role of Information Security Governance
5.3. Establishing Security Policies, Standards, and Procedures
5.4. The Role of Compliance in Information Security
5.5. Industry Standards and Regulatory Compliance (e.g., HIPAA, GDPR, PCI-DSS)
5.6. Auditing and Monitoring Compliance
Chapter 6: Information Security Program Development and Management
6.1. Designing an Information Security Program
6.2. Security Program Frameworks (e.g., NIST, ISO/IEC 27001)
6.3. Developing a Security Culture
6.4. Integrating Information Security into Business Operations
6.5. Resource Management and Funding
6.6. Measuring the Effectiveness of Security Programs
Chapter 7: Security Architecture and Design
7.1. The Principles of Security Architecture
7.2. Security Models and Design Principles
7.3. Defense-in-Depth Strategy
7.4. Security Zones and Segmentation
7.5. Security in the Cloud
7.6. The Role of Security Architecture in Risk Management
Chapter 8: Access Control
8.1. Access Control Principles and Models
8.2. Authentication and Authorization
8.3. Single Sign-On (SSO) and Multi-Factor Authentication
8.4. Role-Based Access Control (RBAC)
8.5. Identity and Access Management (IAM)
8.6. Access Control Systems and Technologies
Chapter 9: Telecommunications and Network Security
9.1. Network Fundamentals
9.2. Network Security Architecture
9.3. Network Protocols and Security Considerations
9.4. Firewalls, IDS/IPS, and VPNs
9.5. Wireless Network Security
9.6. Securing Mobile and Remote Access
9.7. Protecting Network Perimeter
Chapter 10: Cryptography
10.1. Introduction to Cryptography
10.2. Symmetric vs. Asymmetric Cryptography
10.3. Cryptographic Algorithms
10.4. Digital Signatures and Certificates
10.5. Public Key Infrastructure (PKI)
10.6. Key Management and Cryptographic Protocols
10.7. Blockchain and Cryptographic Applications
Chapter 11: Security in the Software Development Lifecycle
11.1. Introduction to Secure Software Development
11.2. The Software Development Lifecycle (SDLC)
11.3. Secure Coding Practices
11.4. Software Security Testing
11.5. Vulnerability Management and Patch Management
11.6. Secure Software Design Principles
Chapter 12: Security Operations and Incident Management
12.1. Incident Management Lifecycle
12.2. The Role of Incident Response Teams
12.3. Incident Detection and Reporting
12.4. Handling and Responding to Security Incidents
12.5. Business Continuity and Disaster Recovery Planning
12.6. Lessons Learned and Post-Incident Analysis
Chapter 13: Business Continuity and Disaster Recovery Planning
13.1. The Importance of Continuity Planning
13.2. Developing a Business Continuity Plan (BCP)
13.3. Disaster Recovery Planning (DRP)
13.4. Backup and Redundancy Strategies
13.5. Testing and Maintaining Continuity Plans
13.6. Crisis Management and Communication
Chapter 14: Security Trends and Future Challenges
14.1. The Evolution of Cyber Threats
14.2. Privacy and Data Protection in the Digital Age
14.3. The Impact of Emerging Technologies (IoT, AI, Blockchain)
14.4. The Role of Artificial Intelligence in Cybersecurity
14.5. Securing Cloud Environments
14.6. The Future of Information Security
Appendices
- A. Key Terms and Concepts
- B. Recommended Resources
- C. Glossary of Terms
- D. Index
People also search for Principles of Information Security 6th :
12 principles of information security
basic principles of information security
underlying principles of information security
fundamental principles of information security
cia principles of information securit