Críticas:
Joseph Sherif, Fullerton University, 'I CANNOT WAIT TO ADOPT IT. This book is the best for students and practitioners.' Denise Padavano, Pierce College, 'I would adopt this book for an introductory security management course or a survey course on security management. It covers all the things that are important and the authors did a good job of making the book concise.' Joseph Sherif, Fullerton University, I CANNOT WAIT TO ADOPT IT. This book is the best for students and practitioners. Denise Padavano, Pierce College, I would adopt this book for an introductory security management course or a survey course on security management. It covers all the things that are important and the authors did a good job of making the book concise. Joseph Sherif, Fullerton University, aI CANNOT WAIT TO ADOPT IT. This book is the best for students and practitioners.a Denise Padavano, Pierce College, aI would adopt this book for an introductory security management course or a survey course on security management. It covers all the things that are important and the authors did a good job of making the book concise.a Joseph Sherif, Fullerton University, ?I CANNOT WAIT TO ADOPT IT. This book is the best for students and practitioners.? Denise Padavano, Pierce College, ?I would adopt this book for an introductory security management course or a survey course on security management. It covers all the things that are important and the authors did a good job of making the book concise.? Denise Padavano, Pierce College, "I would adopt this book for an introductory security management course or a survey course on security management. It covers all the things that are important and the authors did a good job of making the book concise." Joseph Sherif, Fullerton University, "I CANNOT WAIT TO ADOPT IT. This book is the best for students and practitioners."
Reseña del editor:
Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition so popular, and case studies and examples continue to populate the book, providing real-life applications for the topics covered.
"Sobre este título" puede pertenecer a otra edición de este libro.