You must be logged in to post a review.
Academic book request
Inspection copies are available to lecturers and course leaders considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with your details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
In-line with our Environmental Policy and to avoid unnecessary wastage, we provide digital access for inspection copy purposes. Print copies can be provided if books are adopted as course reading.
Please note that all requests are subject to our approval. Further details regarding our inspection copy service may be found HERE.
Information Security Management
Author: Michael WorkmanOVERVIEW
This product is available with Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills.
Information Security Management, Second Edition arms students with answers to the most critical questions about the fields of cybersecurity. It provides students with references to more in-depth study in areas where they may need to specialize. The Second Edition covers operations—the job of day-to-day cybersecurity tasks—regulations, compliance, laws and policies, research and development, and the creation of software and cyber defenses for security initiatives.
Each new print copy includes Navigate eBook Access with 365-day access.
TABLE OF CONTENTS
- Part One Information and Cybersecurity
- Chapter 1 Introduction to Information Security
- Chapter 2 Information Security Department and Roles
- Chapter 3 Actors and Practices
- Chapter 4 Corporations: Laws, Regulations and Policies
- Part Two Security Management
- Chapter 5 Information Security Management
- Chapter 6 Assessing Threats and Vulnerabilities
- Chapter 7 Risk Assessments and Risk Management
- Chapter 8 Computer Architecture and Security Models
- Part Three Technologies and Techniques
- Chapter 9 Security Policies and Managing Behaviors
- Chapter 10 Cryptography
- Chapter 11 Network Security, Firewalls, IDS, and SeCM
- Chapter 12 Information Security Horizons
Related Products
Our Reviews
Blog
Last Month's Bestseller
Clinical ECGs in Paramedic Practice
‘This excellent book will be of interest and indeed of much value to anyone wanting to understand ECG interpretation. It is one that I can definitely recommend.’ Douglas Chamberlain, CBE...
ViewBecome a Class VIP!
Sign up to hear about new products, promotions and more! Plus, enjoy a 25% discount and free P&P each month!
Reviews
There are no reviews yet.