skip to content
Roadmap to information security : for IT and InfoSec managers Preview this item
ClosePreview this item

Roadmap to information security : for IT and InfoSec managers

Author: Michael E Whitman; Herbert J Mattord
Publisher: Boston, MA : Course Technology/Cengage Learning, ©2011.
Edition/Format:   Print book : EnglishView all editions and formats

Provides an overview of information security and its relationship to the information needs of an organization. This book guides the information technology manager in dealing with the challenges  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Michael E Whitman; Herbert J Mattord
ISBN: 9781435480308 1435480309
OCLC Number: 460062603
Description: xxix, 523 pages : illustrations ; 24 cm
Contents: Part I: OVERVIEW OF THE SECURITY LANDSCAPE.1. Introduction to the Roadmap to Information Security Roadmap.2. Threats to Information Assets.3. Attacks on Information Assets.Part II: STRATEGIC INFORMATION SECURITY: SECURITY GOVERNANCE.4. Information Technology and Information Security Governance.5. Information Security Roles and Responsibilities.6. Positioning the Information Security Function.7. Conducting an Information Security Assessment.Part III: STRATEGIC INFORMATION SECURITY: RISK MANAGEMENT.8. Risk Management: Risk Identification.9. Risk Management: Risk Assessment.10. Risk Management: Risk Control.11. Alternate Approaches to Risk Management.PART IV: STRATEGIC INFORMATION SECURITY: STANDARDS, REGULATIONS, LAW AND ETHICS.12. Standards for Managing the Information Security Program.13. Emerging Trends in Certification and Accreditation.14. Dealing with Regulatory Compliance and Key Legal Issues.15. Other Important Laws for Every IT/Security Manager.16. Ethics in IT and Information Security.Part V: TACTICAL INFORMATION SECURITY: POLICIES AND PROGRAMS.17. Information Security Policy: Development and Implementation.18. Information Security Policy Types: EISP, ISSP, SysSP.19. Employment Policies and Practices.20. Implementing Security Education, Training, and Awareness Programs.Part VI: TACTICAL INFORMATION SECURITY: CONTINGENCY PLANNING.21. Contingency Planning: Planning for the Worst. 22. The Incident Response Plan.23. The Disaster Recovery Plan.24. The Business Continuity Plan.Part VII: OPERATIONAL INFORMATION SECURITY: NETWORK SECURITY.25. Communications and Operations Management. 26. Firewalls.27. Protecting Remote Access.28. Intrusion Detection Systems.29. Scanning and Analysis Tools.Part VIII: OPERATIONAL INFORMATION SECURITY: CRYPTOGRAPHY AND ACCESS CONTROLS.30. Cryptography in Theory.31. Cryptography in Practice.32. Access Controls and Biometrics.33. Physical Security.Part IX: SUPPLEMENTAL MATERIALS.Appendix A: Information Security Self-Assessment Checklists.Appendix B: Information Security Certification Guidelines - The CISSP/SSCP.Appendix C: Information Security Certification Guidelines - The CISM.
Responsibility: Michael E. Whitman, Herbert J. Mattord ; [foreword by Donn. B. Parker].
More information:


Editorial reviews

Publisher Synopsis

Part I: OVERVIEW OF THE SECURITY LANDSCAPE. 1. Introduction to the Roadmap to Information Security Roadmap. 2. Threats to Information Assets. 3. Attacks on Information Assets. Part II: STRATEGIC Read more...

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Roadmap to information security : for IT and InfoSec managers
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "460062603" ;
    library:placeOfPublication <> ;
    library:placeOfPublication <> ; # Boston, MA
    schema:about <> ; # Computer security
    schema:about <> ; # Data protection
    schema:about <> ;
    schema:about <> ; # Computer networks--Security measures--Management
    schema:about <> ; # Data protection
    schema:about <> ; # Computer security
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <> ; # Herbert J. Mattord
    schema:copyrightYear "2011" ;
    schema:creator <> ; # Michael E. Whitman
    schema:datePublished "2011" ;
    schema:exampleOfWork <> ;
    schema:inLanguage "en" ;
    schema:name "Roadmap to information security : for IT and InfoSec managers"@en ;
    schema:productID "460062603" ;
    schema:publication <> ;
    schema:publisher <> ; # Course Technology/Cengage Learning
    schema:url <> ;
    schema:workExample <> ;
    wdrs:describedby <> ;

Related Entities

<> # Course Technology/Cengage Learning
    a bgn:Agent ;
    schema:name "Course Technology/Cengage Learning" ;

<> # Computer networks--Security measures--Management
    a schema:Intangible ;
    schema:hasPart <> ;
    schema:name "Computer networks--Security measures--Management"@en ;

<> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;

<> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;

<> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;

<> # Michael E. Whitman
    a schema:Person ;
    schema:birthDate "1964" ;
    schema:familyName "Whitman" ;
    schema:givenName "Michael E." ;
    schema:name "Michael E. Whitman" ;

<> # Herbert J. Mattord
    a schema:Person ;
    schema:familyName "Mattord" ;
    schema:givenName "Herbert J." ;
    schema:name "Herbert J. Mattord" ;

    a schema:ProductModel ;
    schema:isbn "1435480309" ;
    schema:isbn "9781435480308" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.