skip to main content
Skip header Section
Principles of Information SecurityJanuary 2011
Publisher:
  • Course Technology Press
  • 25 Thompson Pl.
  • Boston
  • MA
  • United States
ISBN:978-1-111-13821-9
Published:01 January 2011
Pages:
656
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable. Readers can feel confident that they are using a standards-based, content-driven resource to prepare for their work in the field.

Cited By

  1. ACM
    Pennekamp J, Matzutt R, Klinkmüller C, Bader L, Serror M, Wagner E, Malik S, Spiß M, Rahn J, Gürpinar T, Vlad E, Leemans S, Kanhere S, Stich V and Wehrle K (2023). An Interdisciplinary Survey on Information Flows in Supply Chains, ACM Computing Surveys, 56:2, (1-38), Online publication date: 29-Feb-2024.
  2. Sarhan M, Layeghy S, Moustafa N and Portmann M (2022). Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection, Journal of Network and Systems Management, 31:1, Online publication date: 1-Jan-2023.
  3. ACM
    Schlatt V, Sedlmeir J, Traue J and Völter F (2022). Harmonizing Sensitive Data Exchange and Double-spending Prevention Through Blockchain and Digital Wallets: The Case of E-prescription Management, Distributed Ledger Technologies: Research and Practice, 2:1, (1-31), Online publication date: 30-Sep-2023.
  4. Herath T, Herath H and Cullum D (2023). An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks, Information Systems Frontiers, 25:2, (681-721), Online publication date: 1-Apr-2023.
  5. Park E, Kim J and Wiles L (2023). The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information, Information Technology and Management, 24:2, (177-193), Online publication date: 1-Jun-2023.
  6. Jafar M, Al-Fawa’reh M, Barhoush M and Alshira’H M (2022). Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis, Cybernetics and Information Technologies, 22:1, (60-76), Online publication date: 1-Mar-2022.
  7. Abbas S, Ibrahim H and Khan M (2021). A hybrid chaotic blowfish encryption for high-resolution satellite imagery, Multimedia Tools and Applications, 80:17, (26069-26091), Online publication date: 1-Jul-2021.
  8. ACM
    Márquez G and Astudillo H Identifying availability tactics to support security architectural design of microservice-based systems Proceedings of the 13th European Conference on Software Architecture - Volume 2, (123-129)
  9. ACM
    Silva J and Fonte V Data Security and Trustworthiness in Online Public Services Proceedings of the 12th International Conference on Theory and Practice of Electronic Governance, (348-353)
  10. ACM
    Medeiros H, Vilain P and Pereira V Reducing the execution time of unit tests of smart contracts in blockchain platforms Proceedings of the XV Brazilian Symposium on Information Systems, (1-8)
  11. Blanchard N, Gabasova L and Selker T Consonant-Vowel-Consonants for Error-Free Code Entry HCI for Cybersecurity, Privacy and Trust, (19-37)
  12. ACM
    Geko M and Tjoa S An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security Proceedings of the Central European Cybersecurity Conference 2018, (1-6)
  13. ACM
    Anand P and Ryoo J Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-5)
  14. Park E, Kim J and Park Y (2017). The role of information security learning and individual factors in disclosing patients' health information, Computers and Security, 65:C, (64-76), Online publication date: 1-Mar-2017.
  15. Mansour R (2016). Understanding how big data leads to social networking vulnerability, Computers in Human Behavior, 57:C, (348-351), Online publication date: 1-Apr-2016.
  16. JØsok Ø, Knox B, Helkala K, Lugo R, Sütterlin S and Ward P Exploring the Hybrid Space Proceedings, Part II, of the 10th International Conference on Foundations of Augmented Cognition: Neuroergonomics and Operational Neuroscience - Volume 9744, (178-188)
  17. Gai K, Qiu M, Tao L and Zhu Y (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G, Security and Communication Networks, 9:16, (3049-3058), Online publication date: 10-Nov-2016.
  18. ACM
    Green B, Krotofil M and Hutchison D Achieving ICS Resilience and Security through Granular Data Flow Management Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, (93-101)
  19. ACM
    Chan H, Hammad E and Kundur D Investigating the impact of intrusion detection system performance on communication latency and power system stability Proceedings of the Workshop on Communications, Computation and Control for Resilient Smart Energy Systems, (1-6)
  20. ACM
    Anand P, Ryoo J, Kim H and Kim E Threat Assessment in the Cloud Environment Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, (1-8)
  21. Schneider J, Obermeier S and Schlegel R Cyber security maintenance for SCADA systems Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, (89-94)
  22. Jiang Y and Huang J (2016). An intrusion tolerance method based on energy attack for wireless sensor network, International Journal of Distributed Sensor Networks, 2015, (204-204), Online publication date: 1-Jan-2015.
  23. Kärkkäinen H, Ilvonen I and Jussila J (2015). Towards a Business-Driven Process Model for Knowledge Security Risk Management, International Journal of Knowledge Management, 11:4, (1-18), Online publication date: 1-Oct-2015.
  24. Leitner M and Rinderle-Ma S (2014). A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions, Information and Software Technology, 56:3, (273-293), Online publication date: 1-Mar-2014.
  25. ACM
    Szefer J, Jamkhedkar P, Perez-Botero D and Lee R Cyber defenses for physical attacks and insider threats in cloud computing Proceedings of the 9th ACM symposium on Information, computer and communications security, (519-524)
  26. ACM
    Mitchell R and Chen I (2014). A survey of intrusion detection techniques for cyber-physical systems, ACM Computing Surveys, 46:4, (1-29), Online publication date: 1-Apr-2014.
  27. Lehrfeld M, Barrett M and Smith S (2013). Security for software engineering education, Journal of Computing Sciences in Colleges, 29:2, (169-175), Online publication date: 1-Dec-2013.
  28. Paja E, Dalpiaz F and Giorgini P Managing Security Requirements Conflicts in Socio-Technical Systems Proceedings of the 32nd International Conference on Conceptual Modeling - Volume 8217, (270-283)
  29. Syarif I, Zaluska E, Prugel-Bennett A and Wills G Application of bagging, boosting and stacking to intrusion detection Proceedings of the 8th international conference on Machine Learning and Data Mining in Pattern Recognition, (593-602)
Contributors
  • Kennesaw State University
  • Kennesaw State University

Recommendations