logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Principles of Information Security 5th Edition by Michael E Whitman, Herbert J Mattord ISBN 9781285448367 1285448367

  • SKU: EBN-10018104
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

5.0

12 reviews
Instant download (eBook) Principles of Information Security after payment.
Authors:Michael E. Whitman, Herbert J. Mattord
Pages:656 pages.
Year:2014
Editon:5th
Publisher:Course Technology
Language:english
File Size:14.83 MB
Format:pdf
ISBNS:9781285448367, 1285448367
Categories: Ebooks

Product desciption

(Ebook) Principles of Information Security 5th Edition by Michael E Whitman, Herbert J Mattord ISBN 9781285448367 1285448367

(Ebook) Principles of Information Security 5th Edition by Michael E Whitman, Herbert J Mattord - Ebook PDF Instant Download/Delivery: 9781285448367 ,1285448367
Full download (Ebook) Principles of Information Security 5th Edition after payment


Product details:

ISBN 10: 1285448367
ISBN 13: 9781285448367
Author: Michael E Whitman, Herbert J Mattord

Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this market-leading introductory book teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program. Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers.
 

(Ebook) Principles of Information Security 5th Edition Table of contents:

Chapter 1. Introduction to Information Security

The History of Information Security

The 1960s

The 1970s and 80s

The 1990s

2000 to Present

What Is Security?

Key Information Security Concepts

Critical Characteristics of Information

CNSS Security Model

Components of an Information System

Software

Hardware

Data

People

Procedures

Networks

Balancing Information Security and Access

Approaches to Information Security Implementation

Security in the Systems Life Cycle

The Systems Development Life Cycle

The Security Systems Development Life Cycle

Software Assurance—Security in the SDLC

Software Design Principles

The NIST Approach to Securing the SDLC

Security Professionals and the Organization

Senior Management

Information Security Project Team

Data Responsibilities

Communities of Interest

Information Security Management and Professionals

Information Technology Management and Professionals

Organizational Management and Professionals

Information Security: Is It an Art or a Science?

Security as Art

Security as Science

Security as a Social Science

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 2. The Need for Security

Threats and Attacks

2.5 Billion Potential Hackers

Other Studies of Threats

Common Attack Pattern Enumeration and Classification (CAPEC)

The 12 Categories of Threats

Compromises to Intellectual Property

Software Piracy

Copyright Protection and User Registration

Deviations in Quality of Service

Internet Service Issues

Communications and Other Service Provider Issues

Power Irregularities

Espionage or Trespass

Hackers

Hacker Variants

Password Attacks

Forces of Nature

Fire

Floods

Earthquakes

Lightning

Landslides or Mudslides

Tornados or Severe Windstorms

Hurricanes, Typhoons, and Tropical Depressions

Tsunamis

Electrostatic Discharge

Dust Contamination

Human Error or Failure

Social Engineering

Information Extortion

Sabotage or Vandalism

Online Activism

Software Attacks

Malware

Back Doors

Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks

E-mail Attacks

Communications Interception Attacks

Technical Hardware Failures or Errors

The Intel Pentium CPU Failure

Mean Time Between Failure

Technical Software Failures or Errors

The OWASP Top 10

The Deadly Sins in Software Security

Technological Obsolescence

Theft

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 3. Legal, Ethical, and Professional Issues in Information Security

Law and Ethics in Information Security

Organizational Liability and the Need for Counsel

Policy Versus Law

Types of Law

Relevant U.S. Laws

General Computer Crime Laws

Export and Espionage Laws

U.S. Copyright Law

Financial Reporting

Freedom of Information Act of 1966

Payment Card Industry Data Security Standards (PCI DSS)

State and Local Regulations

International Laws and Legal Bodies

U.K. Computer Security Laws

Australian Computer Security Laws

Council of Europe Convention on Cybercrime

World Trade Organization and the Agreement on Trade-Related Aspects of Intellectual Property Rights

Digital Millennium Copyright Act

Ethics and Information Security

Ethical Differences Across Cultures

Ethics and Education

Deterring Unethical and Illegal behavior

Codes of Ethics at Professional Organizations

Major Information Security Professional Organizations

Key U.S. Federal Agencies

Department of Homeland Security

U.S. Secret Service

Federal Bureau of Investigation (FBI)

National Security Agency (NSA)

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 4. Planning for Security

Information Security Planning and Governance

Planning Levels

Planning and the CISO

Information Security Governance

Information Security Governance Outcomes

Information Security Policy, Standards, and Practices

Policy as the Foundation for Planning

Enterprise Information Security Policy

Issue-Specific Security Policy

Systems-Specific Security Policy (SysSP)

Policy Management

The Information Security Blueprint

The ISO 27000 Series

NIST Security Models

Other Sources of Security Frameworks

Design of Security Architecture

Security Education, Training, and Awareness Program

Security Education

Security Training

Security Awareness

Continuity Strategies

The CP Policy

Business Impact Analysis

Incident Response Planning

Disaster Recovery Planning

Business Continuity Planning

Crisis Management

The Consolidated Contingency Plan

Law Enforcement Involvement

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 5. Risk Management

An Overview of Risk Management

Know Yourself

Know the Enemy

The Roles of the Communities of Interest

Risk Appetite and Residual Risk

Risk Identification

Planning and Organizing the Process

Identifying, Inventorying, and Categorizing Assets

Classifying, Valuing, and Prioritizing Information Assets

Security Clearances

Management of Classified Data

Information Asset Valuation

Identifying and Prioritizing Threats

Specifying Asset Vulnerabilities

The TVA Worksheet

Risk Assessment

Planning and Organizing Risk Assessment

Determining the Loss Frequency

Evaluating Loss Magnitude

Calculating Risk

Assessing Risk Acceptability

The FAIR Approach to Risk Assessment

Risk Control

Selecting Control Strategies

Defense

Transfer

Mitigation

Acceptance

Termination

Justifying Controls

Implementation, Monitoring, and Assessment of Risk Controls

Quantitative Versus Qualitative Risk Management Practices

Benchmarking and Best Practices

Baselining

Other Feasibility Studies

Recommended Risk Control Practices

Documenting Results

The NIST Risk Management Framework

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 6. Security Technology: Firewalls and VPNs

Access Control

Access Control Mechanisms

Biometrics

Access Control Architecture Models

Bell-LaPadula Confidentiality Model

Firewalls

Firewall Processing Modes

Firewall Architectures

Selecting the Right Firewall

Configuring and Managing Firewalls

Content Filters

Protecting Remote Connections

Remote Access

Virtual Private Networks (VPNs)

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 7. Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

Intrusion Detection and Prevention Systems

IDPS Terminology

Why Use an IDPS?

Types of IDPSs

IDPS Detection Methods

IDPS Response Behavior

Selecting IDPS Approaches and Products

Strengths and Limitations of IDPSs

Deployment and Implementation of an IDPS

Measuring the Effectiveness of IDPSs

Honeypots, Honeynets, and Padded Cell Systems

Trap-and-Trace Systems

Active Intrusion Prevention

Scanning and Analysis Tools

Port Scanners

Firewall Analysis Tools

Operating System Detection Tools

Vulnerability Scanners

Packet Sniffers

Wireless Security Tools

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 8. Cryptography

Foundations of Cryptology

Terminology

Cipher Methods

Substitution Cipher

Transposition Cipher

Exclusive OR

Vernam Cipher

Book-Based Ciphers

Hash Functions

Cryptographic Algorithms

Symmetric Encryption

Asymmetric Encryption

Encryption Key Size

Cryptographic Tools

Public Key Infrastructure (PKI)

Digital Signatures

Digital Certificates

Hybrid Cryptography Systems

Steganography

Protocols for Secure Communications

Securing Internet Communication with S-HTTP and SSL

Securing E-mail with S/MIME, PEM, and PGP

Securing Web Transactions with SET, SSL, and S-HTTP

Securing Wireless Networks with WEP and WPA

Securing TCP/IP with IPSec and PGP

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 9. Physical Security

Physical Access Controls

Physical Security Controls

Fire Security and Safety

Fire Detection and Response

Failure of Supporting Utilities and Structural Collapse

Heating, Ventilation, and Air Conditioning

Power Management and Conditioning

Water Problems

Structural Collapse

Maintenance of Facility Systems

Interception of Data

Securing Mobile and Portable Systems

Remote Computing Security

Special Considerations for Physical Security

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 10. Implementing Information Security

Information Security Project Management

Developing the Project Plan

Project Planning Considerations

The Need for Project Management

Security Project Management Certifications

Technical Aspects of Implementation

Conversion Strategies

The Bull’s-Eye Model

To Outsource or Not

Technology Governance and Change Control

The SANS Top 20 Critical Security Controls

Nontechnical Aspects of Implementation

The Culture of Change Management

Considerations for Organizational Change

Information Systems Security Certification and Accreditation

Certification Versus Accreditation

The NIST Security Life Cycle Approach

NSTISS Certification and Accreditation

ISO 27001/27002 Systems Certification and Accreditation

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 11. Security and Personnel

Positioning and Staffing the Security Function

Staffing the Information Security Function

Credentials for Information Security Professionals

( ISC ) 2 Certifications

ISACA Certifications

SANS Certifications

EC Council Certifications

CompTIA Certifications

ISFCE Certifications

Certification Costs

Advice for Information Security Professionals

Employment Policies and Practices

Job Descriptions

Interviews

Background Checks

Employment Contracts

New Hire Orientation

On-the-Job Security Training

Evaluating Performance

Termination

Security Considerations for Temporary Employees, Consultants, and Other Workers

Temporary Employees

Contract Employees

Consultants

Business Partners

Internal Control Strategies

Privacy and the Security of Personnel Data

Selected Readings

Chapter Summary

Review Questions

Exercises

Case Exercises

Chapter 12. Information Security Maintenance

Security Management Maintenance Models

NIST SP 800-100, Information Security Handbook: A Guide for Managers

The Security Maintenance Model

Digital Forensics

The Digital Forensics Team

Affidavits and Search Warrants

Digital Forensics Methodology

Evidentiary Procedures

Selected Readings

Chapter Summary

Review Questions

Exercises

People also search for (Ebook) Principles of Information Security 5th Edition:

    
principles of computer security pdf
    
principles of cyber security pdf
    
principles of information security ppt
    
principles of information security pdf
    
principles of computer networks and information security

Tags: Michael E Whitman, Herbert J Mattord, Information Security

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products