Imagen 1 de 1

Galería
Imagen 1 de 1

¿Quieres vender uno?
Principles of Information Systems Security : Texts and Cases by Gurpreet Dhillon
USD17,00
Aproximadamente14,58 EUR
Estado:
Nuevo
Libro nuevo, sin usar y sin leer, que está en perfecto estado; incluye todas las páginas sin defectos. Consulta el anuncio del vendedor para obtener más información.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Envío:
Gratis USPS Media MailTM.
Ubicado en: Ashburn, Virginia, Estados Unidos
Entrega:
Entrega prevista entre el lun. 8 sep. y el sáb. 13 sep. a 94104
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Pagos:
Compra con confianza
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:388853371327
El 10% de la venta de este artículo se destinará a Palestinian American Medical Association
- Anuncio oficial de eBay for Charity. Más información
- Esta venta beneficia a un afiliado sin ánimo de lucro.
Características del artículo
- Estado
- ISBN
- 9780471450566
Acerca de este producto
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471450561
ISBN-13
9780471450566
eBay Product ID (ePID)
43558971
Product Key Features
Number of Pages
464 Pages
Language
English
Publication Name
Principles of Information Systems Security : Texts and Cases
Publication Year
2006
Subject
Security / Networking, Information Technology
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
1.2 in
Item Weight
37 Oz
Item Length
10.4 in
Item Width
7.3 in
Additional Product Features
Intended Audience
College Audience
LCCN
2006-041705
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Ch 1: Information System Security: nature and scope Technical Aspects of Information System Security Ch 2: Security of Technical Systems in Organizations: an introduction Ch 3: Designing Technically Secure IS: formal models Ch 4: Encryption and Technical IS Security Ch 5: Controls and System Development Formal Aspects of Information System Security Ch 6: Security of Formal Systems in Organizations: an introduction Ch 7: Information System Security Management and Policy Ch 8: Risk Management for Information System Security Ch 9: Monitoring and Audit Control for Information System Security Informal Aspects of Information System Security Ch 10: Security of Informal Systems in Organizations: an introduction Ch 11: Corporate Governance for Information System Security Ch 12: Developing an Information System Security Culture Regulatory Aspects of Information System Security Ch 13: Security Standards and Evaluation Criteria Ch 14: Legal Aspects of IS Security - to deal with encryption Ch 15: Computer Forensics Ch 16: Conclusion Cases C1: The Case of Password Management in local government C2: The Case of client server system implementation and Information System Security C3: The Case of Information System Security in Health Care Administration C4: Computer crime and the Demise of Barings Bank case C5: The Role of IT Systems in the Demise of Drexel Burnham Lambert C6: The Case of Security Management at the Tower C7: It won't part you hair: the INSLAW Affair C8: M&M Procurement Inc
Synopsis
The real threat to information system security comes from people, not computers. That's why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data. Addressing both the technical and human side of IS security, Dhillon's Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations., The real threat to information system security comes from people, not computers. Thats why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data., The real threat to information system security comes from people, not computers. Thats why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data. Addressing both the technical and human side of IS security, Dhillons Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations., No one ever arrested a computer for computer crime. The real threat to information systems security comes from people, not computers. That s why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage of proprietary data. Addressing both the technical and human side of information systems security, Dhillon s Principles of Information Systems Security helps future managers understand the broad range of technical, managerial, ethical, and legal issues related to IS security, and equips them with specific tools and techniques to support effective IS security management. Key Features Balanced coverage addresses the social and technical nature of IS security. Takes a managerial orientation, presenting key security challenges that information technology managers commonly face. Provides an analytical framework to conceptualize IS security problems. Draws on a range of disciplines, such as computer science, sociology, law, anthropology, and behavioral science. Cases put the theoretical material in real-life context. Gurpreet Dhillon is a Professor of Information Systems in the School of Business, Virginia Commonwealth University, Richmond, USA. He is the Editor-in-Chief of the Journal of Information System Security , is the North American Regional Editor of the International Journal of Information Management, and sits on the editorial board of MISQ Executive .
LC Classification Number
QA76.9.A25
Descripción del artículo del vendedor
Acerca de este vendedor
Albiruni Books
100% de votos positivos•172 artículos vendidos
Registrado como vendedor particularPor tanto, no se aplican los derechos de los consumidores derivados de las leyes de protección de los consumidores de la UE. La Garantía al cliente de eBay sigue aplicando a la mayoría de compras. Más informaciónMás información
Votos de vendedor (34)
- r***s (12)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaItem arrived quickly and as described. I can’t say much about the seller, as I didn’t need to contact them directly, however that is a good thing and a thumbs up for them.New Arabic Harry Potter and the Half-Blood Prince book هاري بوتر (part 6) (#388292074682)
- i***0 (183)- Votos emitidos por el comprador.Último añoCompra verificadaItem as described. Great price. Super fast shipping. Well packaged. First class A+++ seller.Topology : A First Course by James Munkres (1974, Hardcover) (#387757333770)
- _***5 (15)- Votos emitidos por el comprador.Mes pasadoCompra verificadaVery nice books in new condition and securely packaged. Fast shipping and good value and I know I will enjoy reading them.