EUR 107,79
  • Alle Preisangaben inkl. MwSt.
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon.
Geschenkverpackung verfügbar.
Menge:1
Management of Information... ist in Ihrem Einkaufwagen hinzugefügt worden
Ihren Artikel jetzt
eintauschen und
EUR 2,50 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Dieses Bild anzeigen

Management of Information Security (Englisch) Taschenbuch – 7. Oktober 2013


Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Taschenbuch
"Bitte wiederholen"
EUR 107,79
EUR 86,22 EUR 116,74
12 neu ab EUR 86,22 2 gebraucht ab EUR 116,74
Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation


Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Pressestimmen

1. Introduction to Management of Information Security. 2. Planning for Security. 3. Planning for Contingencies. 4. Information Security Policy. 5. Developing the Security Program. 6. Security Management Models. 7. Security Management Practices. 8. Risk Management: Identifying and Assessing Risk. 9. Risk Management: Controlling Risk. 10. Protection Mechanisms. 11. Personnel and Security. 12. Law and Ethics. Appendix A. NIST SP 800-26, Security Self-Assessment Guide for Information. Technology Systems and ISO 27002 Questionnaire. Appendix B. Risk Management Models.

Über den Autor und weitere Mitwirkende

Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology. Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.

In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis
Hier reinlesen und suchen:

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 6 Rezensionen
4 von 4 Kunden fanden die folgende Rezension hilfreich
Hard to Read 3. Juni 2014
Von Paul S. Heath - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
My teacher assigned this book for our class and it is one of the hardest and driest books to read. I feel like every chapter is the same and I am reading a slightly different versions of chapter one. To top it off I have to take a quiz on the information. Even the powerpoints that accompany the book are 55 slides or more.
I think this book suffers mainly from lazy writing and lazy editing. If this book had been properly edited it would have been a third of the size that it is and the student would walk away with the meat of the subject instead of a little meat and a whole lot of fat.
2 von 2 Kunden fanden die folgende Rezension hilfreich
Reading/seraching contents from kindle but is very very slow. not worth it unless amazon provides PDF file 8. Juni 2014
Von SL - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
I was Reading/searching contents from kindle app that is very very slow. not worth it unless amazon provides PDF file.

I have spent $75 and now I am crying.

I am asking amazon for providing any other solution or provide PDF file itself.
It is recommended that is textbook come with an interactive course to ... 24. September 2014
Von Christpher D. Quye - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
This textbook was written well, it helped me to understand the nature of information security, and how to properly management. It is recommended that is textbook come with an interactive course to help include updated security threats to IT networks.
Two Stars 2. November 2014
Von Sam - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Very expensive, mediocre quality textbook.
Five Stars 20. Oktober 2014
Von Denis Kivuthi - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
This book was in grear shape!
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.