PRINCIPLES OF INFORMATION SYSTEMS SECURITY

Gurpreet Dhillon, The University of North Carolina at Greensboro
Request a Review Copy.

Ordering Information

Edition 1.1

Copyright 2017
Publication Date: December 27, 2016
Slightly updated version of the first edition formerly published by Wiley.

eTextbook:

Student price: $35
ISBN: 978-1-943153-22-0

Paperback:

Student price: $55
ISBN: 978-1-943153-23-7

Campus bookstores may order eTextbooks and paperbacks from Redshelf.com (contact [email protected]) or eTextbooks from VitalSource.com.

Available directly to students from these distributors: 

  • REDSHELF.COM (eTextbooks and print): Click HERE to order.
  • VITAL SOURCE (eTextbooks only):  Click HERE to order.
  • CREATE SPACE (print only): Click HERE to order.

 

Edition 2.0

  • Available October, 2017
  • Fully revised and updated new edition.
  • eTextbook ISBN: 978-1-943153-24-4, Student price: $54
  • Paperback ISBN: 978-1-943153-25-1, Student price: $78

Description & Features

Designed for undergraduate and graduate information systems security courses, Dhillon’s text addresses both the technical and human side of information systems security. This text helps future managers understand the broad range of technical, managerial, ethical, and legal issues related to IS security, and equips them with specific tools and techniques to support effective IS security management.

  • Balanced coverage addresses the social and technical nature of IS security.
  • Presents key security challenges that IT managers commonly face.
  • Provides an analytical framework to conceptualize IS security problems.
  • Cases put the theoretical material in real-life context.

Table of Contents, Edition 1.1

Chapter 1 Information Systems Security: Nature and Scope

PART I: TECHNICAL ASPECTS OF INFORMATION SYSTEMS SECURITY

Chapter 2 Security of Technical Systems in Organizations: An Introduction

Chapter 3 Models for Technical Specification of Information Systems Security

Chapter 4 Cryptography and Technical Information Systems Security

Chapter 5 Network Security

PART II: FORMAL ASPECTS OF INFORMATION SYSTEMS SECURITY

Chapter 6 Security of Formal Systems in Organizations: An Introduction

Chapter 7 Planning for Information Systems Security

Chapter 8 Designing Information Systems Security

Chapter 9 Risk Management for Information Systems Security

PART III: INFORMAL ASPECTS OF INFORMATION SYSTEMS SECURITY

Chapter 10 Security of Informal Systems in Organizations: An Introduction

Chapter 11 Corporate Governance for IS Security

Chapter 12 Culture and Information Systems Security

PART IV: REGULATORY ASPECTS OF INFORMATION SYSTEMS SECURITY

Chapter 13 Information Systems Security Standards

Chapter 14 Legals Aspects of Information Systems Security

Chapter 15 Computer Forensics

Chapter 16 Summary Principles for Information Systems Security

CASES:

1. Case of a Computer Hack

2. Botnet: Anatomy of a Case

3. Cases in Computer Crime

4. IS Security in Southam Council

5. Security Management at the Tower

6. Computer Crime and the Demise of Barings Bank

7. Technology-Enabled Fraud and the Demise of Drexel Burnham Lambert

8. It Won’t Part Your Hair: The INSLAW Affair

9. Taylor City Police Department Security Breach

10. Developing a Security Policy at M&M Procurement, Inc.