000 01615cam a22003497a 4500
001 15004560
003 UoK
005 20180911144533.0
008 070912s2008 maua b 001 0 eng d
010 _a 2007530534
020 _a9781423901303 (pbk.)
020 _a1423901304 (pbk.)
035 _a(OCoLC)ocn123198622
040 _aAKC
_cAKC
_dBAKER
_dYDXCP
_dBTCTA
_dDLC
042 _alccopycat
050 0 0 _aTK5105.59
_b.W5356 2008
100 1 _aWhitman, Michael E.,
_d1964-
245 1 0 _aManagement of information security /
_cMichael E. Whitman, Herbert J. Mattord.
250 _a2nd ed.
260 _aBoston, Mass. :
_bThomson Course Technology,
_cc2008.
300 _axxiii, 576 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 2 _ach. 1. Introduction to the management of information security -- ch. 2. Planning for security -- ch. 3. Planning for contingencies -- ch. 4. Information security policy -- ch. 5. Developing the security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8. Risk management -- ch. 9. Protection mechanisms -- ch. 10. Personnel and security -- ch. 11. Law and ethics -- ch. 12. Information security project management.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security.
650 0 _aInformation technology
_xSecurity measures.
650 0 _aInformation technology
_xManagement.
700 1 _aMattord, Herbert J.
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2lcc
_cLL
999 _c223
_d223