PRINCIPLES OF INFORMATION SYSTEMS SECURITY
Gurpreet Dhillon, The University of North Carolina at Greensboro
Publication Date: December 27, 2016
Slightly updated version of the first edition formerly published by Wiley.
Student price: $35
Student price: $55
Campus bookstores may order eTextbooks and paperbacks from Redshelf.com (contact [email protected]) or eTextbooks from VitalSource.com.
Available directly to students from these distributors:
- REDSHELF.COM (eTextbooks and print): Click HERE to order.
- VITAL SOURCE (eTextbooks only): Click HERE to order.
- CREATE SPACE (print only): Click HERE to order.
- Available October, 2017
- Fully revised and updated new edition.
- eTextbook ISBN: 978-1-943153-24-4, Student price: $54
- Paperback ISBN: 978-1-943153-25-1, Student price: $78
Description & Features
Designed for undergraduate and graduate information systems security courses, Dhillon’s text addresses both the technical and human side of information systems security. This text helps future managers understand the broad range of technical, managerial, ethical, and legal issues related to IS security, and equips them with specific tools and techniques to support effective IS security management.
- Balanced coverage addresses the social and technical nature of IS security.
- Presents key security challenges that IT managers commonly face.
- Provides an analytical framework to conceptualize IS security problems.
- Cases put the theoretical material in real-life context.
Table of Contents, Edition 1.1
Chapter 1 Information Systems Security: Nature and Scope
PART I: TECHNICAL ASPECTS OF INFORMATION SYSTEMS SECURITY
Chapter 2 Security of Technical Systems in Organizations: An Introduction
Chapter 3 Models for Technical Specification of Information Systems Security
Chapter 4 Cryptography and Technical Information Systems Security
Chapter 5 Network Security
PART II: FORMAL ASPECTS OF INFORMATION SYSTEMS SECURITY
Chapter 6 Security of Formal Systems in Organizations: An Introduction
Chapter 7 Planning for Information Systems Security
Chapter 8 Designing Information Systems Security
Chapter 9 Risk Management for Information Systems Security
PART III: INFORMAL ASPECTS OF INFORMATION SYSTEMS SECURITY
Chapter 10 Security of Informal Systems in Organizations: An Introduction
Chapter 11 Corporate Governance for IS Security
Chapter 12 Culture and Information Systems Security
PART IV: REGULATORY ASPECTS OF INFORMATION SYSTEMS SECURITY
Chapter 13 Information Systems Security Standards
Chapter 14 Legals Aspects of Information Systems Security
Chapter 15 Computer Forensics
Chapter 16 Summary Principles for Information Systems Security
1. Case of a Computer Hack
2. Botnet: Anatomy of a Case
3. Cases in Computer Crime
4. IS Security in Southam Council
5. Security Management at the Tower
6. Computer Crime and the Demise of Barings Bank
7. Technology-Enabled Fraud and the Demise of Drexel Burnham Lambert
8. It Won’t Part Your Hair: The INSLAW Affair
9. Taylor City Police Department Security Breach
10. Developing a Security Policy at M&M Procurement, Inc.