|Listed in category:
Have one to sell?

Principles of Information Systems Security : Texts and Cases by Gurpreet Dhillon

US $17.00
ApproximatelyRM 71.90
Condition:
Brand New
Giving never felt so good. This sale benefits charity.
Breathe easy. Returns accepted.
Shipping:
Free USPS Media MailTM.
Located in: Ashburn, Virginia, United States
Delivery:
Estimated between Wed, 10 Sep and Mon, 15 Sep to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:388853371327

10% of the sale of this item will benefit Palestinian American Medical Association

PAMA is a non for profit organization that delivers clinical and educational services to our people in Gaza and West Bank. We deliver several sustainable, longterm and zakat eligible projects. These ...
  • Official eBay for Charity listing. Learn more
  • This sale benefits a verified non-profit partner.

Item specifics

Condition
Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
ISBN
9780471450566

About this product

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471450561
ISBN-13
9780471450566
eBay Product ID (ePID)
43558971

Product Key Features

Number of Pages
464 Pages
Language
English
Publication Name
Principles of Information Systems Security : Texts and Cases
Publication Year
2006
Subject
Security / Networking, Information Technology
Type
Textbook
Subject Area
Computers
Author
Gurpreet Dhillon
Format
Hardcover

Dimensions

Item Height
1.2 in
Item Weight
37 Oz
Item Length
10.4 in
Item Width
7.3 in

Additional Product Features

Intended Audience
College Audience
LCCN
2006-041705
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Ch 1: Information System Security: nature and scope Technical Aspects of Information System Security Ch 2: Security of Technical Systems in Organizations: an introduction Ch 3: Designing Technically Secure IS: formal models Ch 4: Encryption and Technical IS Security Ch 5: Controls and System Development Formal Aspects of Information System Security Ch 6: Security of Formal Systems in Organizations: an introduction Ch 7: Information System Security Management and Policy Ch 8: Risk Management for Information System Security Ch 9: Monitoring and Audit Control for Information System Security Informal Aspects of Information System Security Ch 10: Security of Informal Systems in Organizations: an introduction Ch 11: Corporate Governance for Information System Security Ch 12: Developing an Information System Security Culture Regulatory Aspects of Information System Security Ch 13: Security Standards and Evaluation Criteria Ch 14: Legal Aspects of IS Security - to deal with encryption Ch 15: Computer Forensics Ch 16: Conclusion Cases C1: The Case of Password Management in local government C2: The Case of client server system implementation and Information System Security C3: The Case of Information System Security in Health Care Administration C4: Computer crime and the Demise of Barings Bank case C5: The Role of IT Systems in the Demise of Drexel Burnham Lambert C6: The Case of Security Management at the Tower C7: It won't part you hair: the INSLAW Affair C8: M&M Procurement Inc
Synopsis
The real threat to information system security comes from people, not computers. That's why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data. Addressing both the technical and human side of IS security, Dhillon's Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations., The real threat to information system security comes from people, not computers. Thats why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data., The real threat to information system security comes from people, not computers. Thats why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data. Addressing both the technical and human side of IS security, Dhillons Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations., No one ever arrested a computer for computer crime. The real threat to information systems security comes from people, not computers. That s why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage of proprietary data. Addressing both the technical and human side of information systems security, Dhillon s Principles of Information Systems Security helps future managers understand the broad range of technical, managerial, ethical, and legal issues related to IS security, and equips them with specific tools and techniques to support effective IS security management. Key Features Balanced coverage addresses the social and technical nature of IS security. Takes a managerial orientation, presenting key security challenges that information technology managers commonly face. Provides an analytical framework to conceptualize IS security problems. Draws on a range of disciplines, such as computer science, sociology, law, anthropology, and behavioral science. Cases put the theoretical material in real-life context. Gurpreet Dhillon is a Professor of Information Systems in the School of Business, Virginia Commonwealth University, Richmond, USA. He is the Editor-in-Chief of the Journal of Information System Security , is the North American Regional Editor of the International Journal of Information Management, and sits on the editorial board of MISQ Executive .
LC Classification Number
QA76.9.A25

Item description from the seller

About this seller

Albiruni Books

100% positive feedback172 items sold

Joined Dec 2024
Usually responds within 24 hours

Detailed Seller Ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
4.9
Shipping speed
5.0
Communication
5.0

Seller feedback (37)

All ratings
Positive
Neutral
Negative