Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Principles of Information Systems Security : Texts and Cases by Gurpreet Dhillon
US $17.00
ApproximatelyRM 71.90
Condition:
Brand New
A new, unread, unused book in perfect condition with no missing or damaged pages.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: Ashburn, Virginia, United States
Delivery:
Estimated between Wed, 10 Sep and Mon, 15 Sep to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:388853371327
10% of the sale of this item will benefit Palestinian American Medical Association
- Official eBay for Charity listing. Learn more
- This sale benefits a verified non-profit partner.
Item specifics
- Condition
- Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
- ISBN
- 9780471450566
About this product
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0471450561
ISBN-13
9780471450566
eBay Product ID (ePID)
43558971
Product Key Features
Number of Pages
464 Pages
Language
English
Publication Name
Principles of Information Systems Security : Texts and Cases
Publication Year
2006
Subject
Security / Networking, Information Technology
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
1.2 in
Item Weight
37 Oz
Item Length
10.4 in
Item Width
7.3 in
Additional Product Features
Intended Audience
College Audience
LCCN
2006-041705
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Ch 1: Information System Security: nature and scope Technical Aspects of Information System Security Ch 2: Security of Technical Systems in Organizations: an introduction Ch 3: Designing Technically Secure IS: formal models Ch 4: Encryption and Technical IS Security Ch 5: Controls and System Development Formal Aspects of Information System Security Ch 6: Security of Formal Systems in Organizations: an introduction Ch 7: Information System Security Management and Policy Ch 8: Risk Management for Information System Security Ch 9: Monitoring and Audit Control for Information System Security Informal Aspects of Information System Security Ch 10: Security of Informal Systems in Organizations: an introduction Ch 11: Corporate Governance for Information System Security Ch 12: Developing an Information System Security Culture Regulatory Aspects of Information System Security Ch 13: Security Standards and Evaluation Criteria Ch 14: Legal Aspects of IS Security - to deal with encryption Ch 15: Computer Forensics Ch 16: Conclusion Cases C1: The Case of Password Management in local government C2: The Case of client server system implementation and Information System Security C3: The Case of Information System Security in Health Care Administration C4: Computer crime and the Demise of Barings Bank case C5: The Role of IT Systems in the Demise of Drexel Burnham Lambert C6: The Case of Security Management at the Tower C7: It won't part you hair: the INSLAW Affair C8: M&M Procurement Inc
Synopsis
The real threat to information system security comes from people, not computers. That's why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data. Addressing both the technical and human side of IS security, Dhillon's Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations., The real threat to information system security comes from people, not computers. Thats why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data., The real threat to information system security comes from people, not computers. Thats why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage proprietary data. Addressing both the technical and human side of IS security, Dhillons Princliples of Information Systems Security: Texts and Cases equips managers (and those training to be managers) with an understanding of a broad range issues related to information system security management, and specific tools and techniques to support this managerial orientation. Coverage goes well beyond the technical aspects of information system security to address formal controls (the rules and procedures that need to be established for bringing about success of technical controls), as well as informal controls that deal with the normative structures that exist within organizations., No one ever arrested a computer for computer crime. The real threat to information systems security comes from people, not computers. That s why students need to understand both the technical implementation of security controls, as well as the softer human behavioral and managerial factors that contribute to the theft and sabotage of proprietary data. Addressing both the technical and human side of information systems security, Dhillon s Principles of Information Systems Security helps future managers understand the broad range of technical, managerial, ethical, and legal issues related to IS security, and equips them with specific tools and techniques to support effective IS security management. Key Features Balanced coverage addresses the social and technical nature of IS security. Takes a managerial orientation, presenting key security challenges that information technology managers commonly face. Provides an analytical framework to conceptualize IS security problems. Draws on a range of disciplines, such as computer science, sociology, law, anthropology, and behavioral science. Cases put the theoretical material in real-life context. Gurpreet Dhillon is a Professor of Information Systems in the School of Business, Virginia Commonwealth University, Richmond, USA. He is the Editor-in-Chief of the Journal of Information System Security , is the North American Regional Editor of the International Journal of Information Management, and sits on the editorial board of MISQ Executive .
LC Classification Number
QA76.9.A25
Item description from the seller
Seller feedback (37)
- eBay automated feedback- Feedback left by buyer.Past monthOrder completed successfully—tracked and on time
- eBay automated feedback- Feedback left by buyer.Past monthOrder completed successfully—tracked and on time
- eBay automated feedback- Feedback left by buyer.Past monthOrder completed successfully—tracked and on time
More to explore :
- Lehninger Principles of Biochemistry School Textbooks & Study Guides,
- Nonfiction Books Fiction & Security,
- Nonfiction Security Paperbacks Books,
- Computer & IT Nonfiction Books Fiction & Security,
- Security Computer & IT Nonfiction Paperbacks Books,
- Computer & IT Nonfiction Books Signed Fiction & Security,
- Computer & IT Nonfiction Books with Dust Jacket Fiction & Security,
- Security Computer & IT Nonfiction Books Personalized Fiction Books,
- Computer & IT Nonfiction Books Fiction Large Print & Security,
- Computer & IT Operating Systems Hardcover Nonfiction Books