Readings and cases in information security : law and ethics / Michael E. Whitman and Herbert J. Mattord
Material type:
- 9781435441576
- TK 5105.5 .W45 2011

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Machine Learning | GC TK 5105.5 .W45 2011 (Browse shelf(Opens below)) | c.1 | Available | NULIB000006701 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Machine Learning Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC TK 5102.9 .L96 2014 The essential guide to digital signal processing / | GC TK 5102.9 .L96u 2011 Understanding digital signal processing / | GC TK 5102.9 .T36 2013 Digital signal processing : fundamentals and applications / | GC TK 5105.5 .W45 2011 Readings and cases in information security : law and ethics / | GC TK 5105.8885 .J38 .Z35 2012 Professional JavaScript for web developers / | GC TK 5101 .V47 [2012] Mobile communication : including GSM, CDMA, EDGE, GPRS / | GC T 385 .V57 1992 Visual computing : integrating computer graphics with computer vision / |
Includes index.
1. Preface & Acknowledgments 2. Running case: stratified custom manufacturing -- 3. Personnel and privacy -- 4. Risk management -- 5. Management of security technology -- 6. Information security program management -- 7. Information security governance and regulatory compliance.
READINGS AND CASES IN INFORMATION SECURITY: LAW AND ETHICS provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.
There are no comments on this title.