Summer Reading Sale
 
 

Recently Viewed clear list


Original Essays | Yesterday, 10:00am

Jessica Valenti: IMG Full Frontal Feminism Revisited



It is arguably the worst and best time to be a feminist. In the years since I first wrote Full Frontal Feminism, we've seen a huge cultural shift in... Continue »
  1. $11.90 Sale Trade Paper add to wish list

spacer
Qualifying orders ship free.
$55.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
2 Remote Warehouse Computers Reference- General

Readings & Cases in Information Security: Law & Ethics

by

Readings & Cases in Information Security: Law & Ethics Cover

 

Synopses & Reviews

Publisher Comments:

READINGS AND CASES IN INFORMATION SECURITY: LAW AND ETHICS provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.

Synopsis:

READINGS AND CASES IN INFORMATION SECURITY: LAW and ETHICS can be used to support several courses in the Information Security curriculum, including Incident Response, Disaster Recovery, Risk Management, Principles of Information Security, Ethics in Security, and Management of Information Security. The chapters are interspersed with both a variety of case problems designed to stimulate in class and written discussions.

About the Author

Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology. Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.

Table of Contents

Part I: PREFACE and INTRODUCTION. Part II: RUNNING CASE: INTRODUCTION AND BACKGROUND. Part III: PERSONNEL and PRIVACY. Reading: Data Privacy: Is it Possible? John H. Nugent, Texas Women's University, Case: Technology Department and a Human Resources Department: A Case Study and Analysis. Jeffrey M. Stanton. Syracuse University. Case: IT Ethics and Security in an IT Certification Project. Jeffrey P. Landry, University of South Alabama. J. Harold Pardue, University of South Alabama. Reading: An Etymological View of Ethical Hacking. Michael Whitman, Kennesaw State University. Running Case. Part IV: RISK MANAGEMENT. Reading: CYBER Insurance and Residual Information Risk Management Tridib Bandyopadhyay, Kennesaw State University. Paper: Rethinking Risk-based Security. Herbert Mattord, Kennesaw State University. Case: Video Maze. Patricia Morrison, Cape Breton University. Running Case. Part V: MANAGEMENT OF SECURITY TECHNOLOGY. Reading: Cryptography Algorithms Standards: A Guideline for Management. Wasim A Al-Hamdani, Kentucky State University. Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy Tridib Bandyopadhyay, Kennesaw State University. Case: Advanced Topologies, Inc. Reading: Web Applications: Vulnerabilities and Remediation Shankar Babu Chebrolu, Cisco Systems Vinay K. Bansal, Cisco Systems. Reading: Managing Secure Database Systems Li Yang, University of Tennessee at Chattanooga.Running Case. Part VI: INFORMATION SECURITY PROGRAM MANAGEMENT. Case: Legal and Ethical Issues in Information Security Metrics Jennifer L. Bayuk, Stevens Institute of Technology, School of Systems and Enterprises. Reading: Impact of Incomplete or Missing Information in a Security Policy Wasim A Al-Hamdani, Kentucky State University Wendy Dixie, Kentucky State University. Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security Jeffrey P. Landry, University of South Alabama. Case: The Law in Information Security Management Katherine H. Winters, University of Tennessee at Chattanooga. Running Case. Part VII: REGULATORY COMPLIANCE MANAGEMENT. Reading: Security Compliance Auditing: Review and Research Directions Guillermo A. Francia, III, Jacksonville State University Jeffrey S. Zanzig, Jacksonville State University. Reading: Global Information Security Regulations, Case Studies and Cultural Issues Guillermo A. Francia, III, Jacksonville State University Andrew P. Ciganek, Jacksonville State University. Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study. Divakaran Liginlal, University of South Alabama, Lara Z. Khansa, Virginia Polytechnic Institute and State University, Jeffrey P. Landry, University of South Alabama. Running Case.

Product Details

ISBN:
9781435441576
Author:
Whitman, Michael E.
Publisher:
Course Technology
Author:
Mattord, Herbert J.
Author:
Michael E.(Michael E. Whitman - Ph. D., CISM, CISSP) Whitman
Author:
Whitman, Michael E.(Michael E. Whitman - Ph. D., CISM, CISSP)
Subject:
Networking/Security
Subject:
Security - General
Subject:
Information security management;Legal issues;Ethical issues;Security management;Infosec law;Infosec ethics;Law and ethics;Security law;Computer law
Subject:
information security management
Subject:
legal issues
Subject:
Ethical Issues
Subject:
security management
Subject:
Infosec law
Subject:
Infosec ethics
Subject:
Law and ethics
Subject:
Security (law)
Subject:
Computer law
Subject:
General-General
Copyright:
Publication Date:
20100631
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
384
Dimensions:
9.10x7.30x.60 in. 1.30 lbs.

Related Subjects

» Computers and Internet » Internet » General
» Computers and Internet » Networking » Computer Security
» Computers and Internet » Networking » Security » General

Readings & Cases in Information Security: Law & Ethics New Trade Paper
0 stars - 0 reviews
$55.95 In Stock
Product details 384 pages Course Technology - English 9781435441576 Reviews:
"Synopsis" by , READINGS AND CASES IN INFORMATION SECURITY: LAW and ETHICS can be used to support several courses in the Information Security curriculum, including Incident Response, Disaster Recovery, Risk Management, Principles of Information Security, Ethics in Security, and Management of Information Security. The chapters are interspersed with both a variety of case problems designed to stimulate in class and written discussions.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.