Principles of information security = 信息安全原理 /
作者: Michael E. Whitman, Herbert J. Mattord著.
出版社:
简介:Principles of Information Security examines the field of information security to prepare individuals for their future roles as business decision makers. This book presents both the managerial and the technicla aspects of this exciting discipline and addresses knowledge areas of CISSP(Certified Information Systems Security Professional) certification throughout.
The book provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the field. It covers the terminology of the field, the history of the field, and an overview of how to manage an information security program. In short, it is “an inch deep and a mile wide”.
Certified Information Systems Security Professionals Common Body of Knowledge —Because the authors are Certified Information Systems Security Professionals (CISSP), the CISSP knowledge domains have had an influence in the design of the text. Although care was taken to avoid producing another CISSP study guide, the author’s backgrounds have resulted in a treatment that ensures that much of the CISSP Common Body of Knowledge (CBK) has been integrated into the text to some degree.
Chapter-Opening Scenarios— Each chapter opens with a short story that follows the same fictional company as it encounters some of the issues of information security. The discussion questions that accompany each scenario give the student and the instructor the opportunity to discuss the issues that underlay the content.
Off line and Technical Details Boxes— These sections highlight interesting topics and detailed technical issues, giving the student the option of delving into topics more deeply. Chapters include the Offline and Technical Details boxes as needed.
Hands-On Learning— At the end of each chapter, students find a Chapter Summary and Review Questions as well as Exercises and Case Exercises, which give them the opportunity to examine the information security arena outside the classroom. Using the Exercises, the student can research, analyze and write to reinforce learning objectives and deepen their understanding of the text. With the Case Exercises, students use professional judgment, powers of observation, and elementary research, to create solutions for simple information security scenarios.