Principles of Information Security / (Record no. 44865)

MARC details
000 -LEADER
fixed length control field 05966nam a22002297a 4500
003 - CONTROL NUMBER IDENTIFIER
control field VITAP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230326185724.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230326b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789387994232
040 ## - CATALOGING SOURCE
Transcribing agency VITAP
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 005.8 WHI
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 11306
Personal name Whitman, Michael E.
245 ## - TITLE STATEMENT
Title Principles of Information Security /
Statement of responsibility, etc. Michael E. Whitman and Herbert J. Mattord
250 ## - EDITION STATEMENT
Edition statement 6th Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. Cengage Learning India Pvt. Ltd.
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Other physical details xx, 728p. : ill. ;
Dimensions 24cm
521 ## - TARGET AUDIENCE NOTE
Target audience note It includes Glossary and Index Pages.<br/><br/>Overview:<br/>Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security -- not just the technical control perspective. Students gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. Students review terms used in the field, a history of the discipline, and an overview of how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making it ideal for business decision-makers.<br/><br/>Features:<br/><br/><br/> THIS BOOK ILLUSTRATES HOW INFORMATION SECURITY IS BOTH A MANAGEMENT AND TECHNOLOGY CHALLENGE. Students clearly see how information security in today’s modern organization is a problem for management to solve and not simply a problem that technology alone can answer. Readers examine how security problems have important economic consequences, for which management is held accountable.<br/> BOOK CONSISTENTLY EMPHASIZES REAL-WORLD APPLICATION. Students understand the relevance of what they are learning as this edition is packed with the latest timely, hands-on examples of information security issues, tools, and practices implemented in today's organizations.<br/> ENGAGING, REVELANT CHAPTER OPENERS EMPHASIZE THE CRITICAL NATURE OF INFORMATION SECURITY. Each chapter opens with a short story that follows the same fictional company as it encounters actual real-world issues within modern information security. At the end of the chapter, discussion questions complete the case study scenario, giving you and your students opportunities to discuss the underlying issues.<br/> OFFLINE AND TECHNICAL DETAILS BOXES HIGHLIGHT INTERESTING TOPICS AND CONTEMPORARY TECHNICAL ISSUES. Interspersed throughout the textbook, these captivating features enable your students to delve into key concepts more deeply.<br/> CHAPTERS END WITH A SUMMARY, REVIEW QUESTIONS AND EXERCISES DESIGNED TO EXTEND STUDENT UNDERSTANDING. These end-of-chapter features enable students to examine the information security arena outside of the classroom. Exercises prompt students to research, analyze, and write to reinforce learning objectives and deepen their understanding of the key issues within this edition.<br/> UP-TO-DATE MANAGERIAL CONTENT EQUIPS STUDENTS FOR SUCCESS. This book’s managerial approach offers general, but valuable, information without bogging readers down with extraneous, highly specific details.<br/> THE TEXT PROVIDES SUPPORT FOR MAPPING TO LEADING STANDARDS. With this edition, you can easily map to both the NIST National Initiative for Cybersecurity Education (NICE) Workforce framework and DHS/NSA National Center of Academic Excellence in Cyber Defense Education designation.<br/> COMPLETELY UP TO DATE CONTENT REFLECTS THE LATEST DEVELOPMENTS FROM THE FIELD. Your students examine new innovations in technology and methodologies with this edition’s updated examples and references. This edition ensures you are able to present the most current coverage of emerging issues available.<br/> REFINED TERMS AND GREATER IN-DEPTH CONTENT ON INFORMATION SECURITY THREATS INCREASE THIS EDITION’S RELEVANCE. Updated definitions and timely context of key terminology ensures a contemporary understanding and logical flow of the text. In addition, refined coverage of threats and attacks with added insights and depth on threat levels and severities and reorganized coverage of attacks against information systems prepares students for security challenges.<br/> UPDATED MATERIAL PREVIEWS THE LATEST IN TECHNICAL SECURITY CONTROLS. Students examine how today’s control environment continues its migration to an environment with less emphasis on the network perimeter and more reliance on Cloud Computing and the Internet of Things.<br/> Includes MindTap which is an interactive, customizable and complete learning solution. It includes a MindTap Reader and a library of learning apps (e.g., CNOW, Aplia, ReadSpeaker, Merriam-Webster dictionary, MyContent, RSS Feed, Kaltura, Progress app, etc.).<br/><br/>Table of Contents:<br/><br/>1. Introduction to Information Security.<br/><br/>2. The Need for Security.<br/><br/>3. Legal, Ethical, and Professional Issues in Information Security.<br/><br/>4. Planning for Security.<br/><br/>5. Risk Management.<br/><br/>6. Security Technology: Firewalls, VPNs, and Wireless.<br/><br/>7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools.<br/><br/>8. Cryptography.<br/><br/>9. Physical Security.<br/><br/>10. Implementing Information Security.<br/><br/>11. Security and Personnel.<br/><br/>12. Information Security Maintenance and eDiscovery.<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 11307
Topical term or geographic name entry element Computer security; Computer networks--Security measures; Information technology--Security measures
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 11308
Personal name Mattord, Herbert J.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.cengage.co.in/book-list/print/principles-of-information-security-with-mindtap-d9">https://www.cengage.co.in/book-list/print/principles-of-information-security-with-mindtap-d9</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Text Book
Edition 23rd
Classification part 005.8
Call number suffix WHI
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Use restrictions Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Public note Date last checked out Total Renewals
    Dewey Decimal Classification Paper Back         School of Computer Science Section School of Computer Science Section General Stacks 2023-03-16 Bookionics 775.00 SBH/19082 4 005.8 WHI 020059 2024-02-14 775.00 2023-03-26 Text Book CSE 2024-01-25 2
    Dewey Decimal Classification Paper Back   Restricted Access Not For Loan Reference School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 775.00 SBH/19082   005.8 WHI 020056 2023-03-26 775.00 2023-03-26 Reference Book CSE    
    Dewey Decimal Classification Paper Back         School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 775.00 SBH/19082 2 005.8 WHI 020057 2025-02-21 775.00 2023-03-26 Text Book CSE 2025-02-07  
    Dewey Decimal Classification Paper Back         School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 775.00 SBH/19082 3 005.8 WHI 020058 2025-01-11 775.00 2023-03-26 Text Book CSE 2025-01-04  
    Dewey Decimal Classification Paper Back         School of Computer Science Section VIT-AP General Stacks 2023-03-16 Bookionics 775.00 SBH/19082 5 005.8 WHI 020060 2023-06-12 775.00 2023-03-26 Text Book CSE 2023-05-22 3

Visitor Number:

Powered by Koha