Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Practical information security management : a complete guide to planning and implementation
Campbell T., Apress, New York, NY, 2016. 237 pp. Type: Book (978-1-484216-84-2)
Date Reviewed: Jun 15 2017

The security professional author provides in about 235 pages a clear and concise textbook-style introduction to the field of information security management. The book clearly indicates that it is not designed for professional certification exam study. However, students and other professionals will find basic information, in one location, in an easily read format.

The chapter titles indicate the topics that are addressed: “Evolution of a Profession,” “Threats and Vulnerabilities,” “The Information Security Manager,” “Organizational Security,” “Information Security Implementation,” “Standards, Frameworks, Guidelines, and Legislation,” “Protection of Information,” “Protection of People,” “Protection of Premises,” “Protection of Systems,” “Digital Evidence and Incident Responses,” “Cloud Computing Security,” “Industrial Control Systems,” and “Secure Systems Development.” Chapters average about 15 pages in length, with internal sections and real-world examples to illustrate the points. For example, about half a page each is devoted to Edward Snowden and Kevin Mitnick.

“Warning” and “Tip” boxes keep the reader focused on important points. Figures and lists are equally helpful. UK, EU, US, and Australian legislation and standards are briefly discussed. While containing few references for additional study, there is a good comprehensive index and an eBook is available. An introductory chapter provides a quick look at the practical aspects of the information security field and chapter contents.

This work provides an excellent starting point for anyone wanting a rapid comprehensive overview of information security management.

More reviews about this item: Amazon

Reviewer:  Brad Reid Review #: CR145352 (1708-0530)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy