
Principles of Information Systems Security
Texts and Cases
Résumé
The real threat to information system security comes from people, not computers. That's why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data.
Addressing both the technical and human side of IS security, Dhillon's Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations.
Sommaire
- Information System Security: Nature and Scope
- Technical Aspects Of Information System Security
- Security of Technical Systems in Organizations: an introduction
- Models for Technical Specification of Information System Security
- Cryptography and Technical Information System Security
- Network Security
- Formal Aspects Of Information System Security
- Security of Formal Systems in Organizations: an introduction
- Planning for Information System Security
- Designing Information System Security
- Information System Risk Management
- Informal Aspects Of Information System Security
- Security of Informal Systems in Organizations: an introduction
- Corporate Governance for IS Security
- Culture and IS Security
- Regulatory Aspects Of Information System Security
- Information System Security Standards
- Legal Aspects of IS Security
- Computer Forensics
- Summary principles for Information System Security
- Cases
- Case 1: Case of a Computer Hack
- Case 2: Botnet: Anatomy of a Case
- Case 3: Cases in Computer Crime
- Case 4: IS Security at Southam Council
- Case 5: Security Management at the Tower
- Case 6: Computer crime and the demise of Barings Bank
- Case 7: Technology Enabled Fraud and the Demise of Drexel Burnham Lambert
- Case 8: It won't part you hair: the INSLAW Affair
- Case 9: Taylor City Police Department Security Breach
- Case 10: Developing a Security Policy at M & M Procurement, Inc
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Gurpreet Dhillon |
Parution | 24/04/2005 |
Nb. de pages | 452 |
Format | 19,5 x 24,5 |
Couverture | Relié |
Poids | 865g |
Intérieur | Noir et Blanc |
EAN13 | 9780471450566 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Bases de données Conception et modélisation UML
- Informatique Bases de données Conception et modélisation Merise
- Informatique Informatique d'entreprise Management des systèmes d'information
- Informatique Informatique d'entreprise Knowledge management
- Informatique Informatique d'entreprise Data warehouse et data mining
- Informatique Informatique d'entreprise Sécurité
- Informatique Développement d'applications Gestion de projets
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet