Youbeli Online Shopping Malaysia
Cart: 0 items 
Loading...
Language
Contact Us: 1800 88 2354

AE PRINCIPLES OF INFORMATION SECURITY

AE PRINCIPLES OF INFORMATION SECURITY
Product Code:
269
Model:
9789814846325
Brand:
Cengage
Sold by:
Status:
Pre-order
Delivery Fee:
FREE
FREE shipping with a minimum purchase
West Malaysia - RM0.00
East Malaysia - RM0.00
Rewards:
75 Points
Gadget & Gaming
Notify me when ...
price drops.
product is available.
Product Information

Size (length*width*height): 32cm x 23cm x 6cm

What's in the box:

AE PRINCIPLES OF INFORMATION SECURITY textbook x1

Description

Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security -- not just the technical control perspective. Students gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. Students review terms used in the field, a history of the discipline, and an overview of how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making it ideal for business decision-makers.

 

 

Features

  • THE TEXT PROVIDES SUPPORT FOR MAPPING TO LEADING STANDARDS. With this edition, you can easily map to both the NIST National Initiative for Cybersecurity Education (NICE) Workforce framework and DHS/NSA National Center of Academic Excellence in Cyber Defense Education designation.
  • CHAPTERS END WITH A SUMMARY, REVIEW QUESTIONS AND EXERCISES DESIGNED TO EXTEND STUDENT UNDERSTANDING. These end-of-chapter features enable students to examine the information security arena outside of the classroom. Exercises prompt students to research, analyze, and write to reinforce learning objectives and deepen their understanding of the key issues within this edition.
  • THIS BOOK ILLUSTRATES HOW INFORMATION SECURITY IS BOTH A MANAGEMENT AND TECHNOLOGY CHALLENGE. Students clearly see how information security in today’s modern organization is a problem for management to solve and not simply a problem that technology alone can answer. Readers examine how security problems have important economic consequences, for which management is held accountable.
  • ENGAGING, REVELANT CHAPTER OPENERS EMPHASIZE THE CRITICAL NATURE OF INFORMATION SECURITY. Each chapter opens with a short story that follows the same fictional company as it encounters actual real-world issues within modern information security. At the end of the chapter, discussion questions complete the case study scenario, giving you and your students opportunities to discuss the underlying issues.
  • OFFLINE AND TECHNICAL DETAILS BOXES HIGHLIGHT INTERESTING TOPICS AND CONTEMPORARY TECHNICAL ISSUES. Interspersed throughout the textbook, these captivating features enable your students to delve into key concepts more deeply.
  • CHAPTERS END WITH A SUMMARY, REVIEW QUESTIONS AND EXERCISES DESIGNED TO EXTEND STUDENT UNDERSTANDING. These end-of-chapter features enable students to examine the information security arena outside of the classroom. Exercises prompt students to research, analyze, and write to reinforce learning objectives and deepen their understanding of the key issues within this edition.
  • BOOK CONSISTENTLY EMPHASIZES REAL-WORLD APPLICATION. Students understand the relevance of what they are learning as this edition is packed with the latest timely, hands-on examples of information security issues, tools, and practices implemented in today's organizations.
  • UP-TO-DATE MANAGERIAL CONTENT EQUIPS STUDENTS FOR SUCCESS. This book’s managerial approach offers general, but valuable, information without bogging readers down with extraneous, highly specific details.

 

Table of Contents

1. Introduction to Information Security.
2. The Need for Security.
3. Legal, Ethical, and Professional Issues in Information Security.
4. Planning for Security.
5. Risk Management.
6. Security Technology: Firewalls, VPNs, and Wireless.
7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools.
8. Cryptography.
9. Physical Security.
10. Implementing Information Security.
11. Security and Personnel.
12. Information Security Maintenance and eDiscovery.

AE PRINCIPLES OF INFORMATION SECURITY
How To Buy
Shipping Information
ZoneOrder Total (RM)Delivery Fee (RM)
West MalaysiaFlat RateFREE
East MalaysiaFlat RateFREE

 

Chat with Youbeli
TOP