Management of Information Security, 3rd Edition

  • Michael E. Whitman - Ph. D., CISM, CISSP Michael J. Coles College of Business, Kennesaw State University
  • Herbert J. Mattord - MBA, CISM, CISSP Michael J. Coles College of Business, Kennesaw State University
  • ISBN-10: 1435488849
  • ISBN-13: 9781435488847
  • 592 Pages Paperback 
  • Previous Editions: 2008, 2004
  • © 2011 | Published
Request a Copy
 

About The Solution

Overview

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger on the pulse of industry changes and academic relevance.


Additional Product Information

Features/Benefits

  • Reflects changes in the field, including revised sections on national and international laws and international standards such as the ISO 27000 series.
  • Expanded coverage in key managerial areas of Information Security Governance, Access Control Models, and Information Security Program Assessment and Metrics.
  • Applies a running case study which follows a fictional company as it encounters various information security issues, rounded out by discussion questions that encourage class participation.
  • Offers "Viewpoint" essays to provide a range of commentary that illustrate interesting topics or share personal experiences--providing students with real-world examples.
  • Reinforces skills as they are learned with extensively revised review questions, hands-on activities, and case projects in each chapter.

What's New

  • Reflects changes in the field, including revised sections on national and international laws and international standards like the ISO 27000 series.
  • Additional coverage in key managerial areas of Information Security Governance, Access Control Models, and Information Security Program Assessment and Metrics.
  • Former Chapter 12, Project Management, has been merged into Chapter 1 – providing all introductory and general IT managerial material in the opening chapter.
  • Chapter 6, Security Management Models and Practices, has been split into two chapters and enhanced with more practices and models, consolidating and enhancing coverage of security management materials.

Best Buy Packages

Other Popular Packages

Choose the textbook packaged with the resources that best meet your course and student needs. Contact your Cengage Learning representative for more information.


Bundle: Text + Lab Manual
ISBN-10: 1111203245  | ISBN-13: 9781111203245


Bundle: Text + Readings & Cases in Information Security: Law & Ethics
ISBN-10:  1111203237  | ISBN-13:  9781111203238


Bundle: Text + Readings and Cases in the Management of Information Security
ISBN-10:  1111203199  | ISBN-13:  9781111203191



ISBN-10:  1133069916 | ISBN-13:  9781133069911


Table of Contents

Unit I: INTRODUCTION.
1: Introduction to Management of Information Security.
UNIT II: PLANNING.
2: Planning for Security.
3: Planning for Contingencies.
UNIT III: POLICY AND PROGRAMS.
4: Security Policy.
5: Developing Security Programs.
6: Security Management Models.
7: Security Management Practices.
UNIT IV: PROTECTION.
8: Risk Assessment.
9: Controlling Risk.
10: Protection Mechanisms.
UNIT V: PEOPLE.
11: Personnel and Security.
12: Law and Ethics.
Appendix A : NIST SP 800-26, Security Self-Assessment Guide for Information.
Technology Systems and ISO 27002 Questionnaire.
Appendix B : Risk Management Models.

Supplements

Instructor Supplements

Instructor Supplements

All supplements have been updated in coordination with the main title. Select the main title’s "About the Solution" tab, then select "What's New" for updates specific to title's edition. For more information about these supplements, or to obtain them, contact your Learning Consultant.

Cengage Learning eBook Instant Access Code  (ISBN-10: 1111312915 | ISBN-13: 9781111312916)


Instructor Resource CD-ROM  (ISBN-10: 1435488830 | ISBN-13: 9781435488830)

The following supplemental materials are available when this book is used in a classroom setting. All the instructor supplements available with this book are provided to instructors on a single CD, called the Instructor's Resource CD (ISBN 1-4354-8883-0), or available online via the Instructor's Resource Site accessed via the book's product page on www.cengage.com. Electronic Instructor's Manual--The Instructor's Manual includes suggestions and strategies for using this text, such as advice for lecture topics. It also includes answers to the review questions and suggested solutions to the exercises at the end of each chapter. PowerPoint presentations--This book comes with Microsoft PowerPoint slides for each chapter. They're included as a teaching aid for classroom presentation, to make available to students on the network for chapter review, or to be printed for classroom distribution. Instructors, please feel free to add your own slides for additional topics you introduce to the class. Figure files--Figure files allow instructors to create their own presentations using figures taken from the text. ExamView®--ExamView®, the ultimate tool for objective-based testing needs, is a powerful test generator that enables instructors to create paper, LAN, or Web-based tests from test banks designed specifically for their Cengage Course Technology text. Instructors can utilize the ultra-efficient QuickTest Wizard to create tests in less than five minutes by taking advantage of Cengage Course Technology's questions banks, or customize their own exams from scratch.


Readings and Cases in the Management of Information Security  (ISBN-10: 0619216271 | ISBN-13: 9780619216276)

These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry professionals.


Readings & Cases in Information Security: Law & Ethics  (ISBN-10: 1435441575 | ISBN-13: 9781435441576)

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text, this resource offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.


Hands-On Information Security Lab Manual  (ISBN-10: 061921631X | ISBN-13: 9780619216313)

The Hands-On Information Security Lab Manual, Second Edition allows students to apply the basics of their introductory security knowledge in a hands-on environment with detailed exercises using Windows 2000, XP and Linux. This non-certification based lab manual includes coverage of scanning, OS vulnerability analysis and resolution firewalls, security maintenance, forensics, and more. A full version of the software needed to complete these projects is included on a CD with every text, so instructors can effortlessly set up and run labs to correspond with their classes. The Hands-On Information Security Lab Manual, Second Edition is a suitable resource for introductory, technical and managerial courses, and is the perfect accompaniment to Principles of Information Security, Second Edition and Management of Information Security.


Student Supplements

Student Supplements

All supplements have been updated in coordination with the main title. Select the main title’s "About the Solution" tab, then select "What's New" for updates specific to title's edition. For more information about these supplements, or to obtain them, contact your Learning Consultant.

Cengage Learning eBook Instant Access Code  (ISBN-10: 1111312915 | ISBN-13: 9781111312916)


Readings and Cases in the Management of Information Security  (ISBN-10: 0619216271 | ISBN-13: 9780619216276)

This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.


Readings & Cases in Information Security: Law & Ethics  (ISBN-10: 1435441575 | ISBN-13: 9781435441576)

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.


Hands-On Information Security Lab Manual  (ISBN-10: 061921631X | ISBN-13: 9780619216313)

This lab manual allows students to get hands-on application experience on topics ranging from firewalls and forensics to scanning and operating system vulnerability.


Meet the Author

About the Author

Michael E. Whitman - Ph. D., CISM, CISSP

Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology.

Herbert J. Mattord - MBA, CISM, CISSP

Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.