Principles of Information Security by Whitman

Document Sample
Principles of Information Security by Whitman Powered By Docstoc
					             Ateneo Professional Schools Library
                   Rockwell Drive, Rockwell Center, Makati City

Information Resources Guide on


            2005 - 2008
Information security is the process of protecting data from unauthorized
access, use, disclosure, destruction, modification, or disruption.[1] The terms
information security, computer security and information assurance are frequently
used interchangeably. These fields are interrelated and share the common goals of
protecting the confidentiality, integrity and availability of information; however,
there are some subtle differences between them. Information security is concerned
with the confidentiality, integrity and availability of data regardless of the form the
data may take: electronic, print, or other forms.

Other related subjects:
Computer networks - - Security Measures
Privacy, Right of
Computer security
Management information systems

A. BOOKS (Located at the General Collection Shelves near the Circulation
    Haag, Stephen, Paige Baltzan, Amy Phillips. (2008). Business driven
       technology. 2nd ed. HD 30.2 H32 2008

    O’Brien, James A., George M. Marakas. (2008). Management information
       systems. 8th ed. T 58.6 O26 2008

    Bazavan, Ioana V. (2007). Information security cost management. QA 76.9

    Dictionary of health information technology and security. (2007). R 858

    Schou, Corey. (2007). Information assurance for the enterprise :a roadmap to
        information security. QA 76.9 A25S35

    Westerman, George. (2007). IT risk :turning business threats into competitive
       advantage. HD 30.2 W464

    Brewer, Dennis C. (2006). Security controls for Sarbanes-Oxley section
       404 IT compliance : authorization, authentication, and access. QA 76.9

    Cannon, David L., Timothy S. Bergmann, Brady Pamplin. (2006). CISA -
       Certified Information Systems Auditor : study guide. QA 76.3 C34

    Colarik, Andrew Michael. (2006). Cyber terrorism :political and economic
        implications. HV 6773 C64
Dhillon, Gurpreet. (2006). Principles of information systems security : text
    and cases. QA 76.9 A25D52

Hacker’s challenge 3 : 20 brand-new forensic scenarios solutions. (2006).
   QA 76.9 A25H32

LeVeque, Vincent. (2006). Information security :a strategic approach. QA
   76.9 A25L48

Noonan, Wes, Ido Dubrawsky. (2006). Firewall fundamentals. TK 5105.59

Osborne, Mark. (2006). How to cheat at managing information security. QA
   76.9 A25O83

Scambray, Joel, Mike Shema, Caleb Sima. (2006). Hacking exposed : Web
   applications. 2nd ed. TK 5105.59 S32 2006

Web and information security. (2006). TK 51505.59 W42

Advances in security and payment methods for mobile commerce. (2005).
   HF 5548.34 A37

Babiak, Jan, John Butters, Mark W. Doll. (2005). Defending the digital
    frontier : practical security for management. 2nd ed. TK 5105.59 D65

Calder, Alan and Steve Watkins. (2005). IT governance : a manager’s guide to
    data security and BS 7799/ISO 17799. 3rd ed. QA 76.9 A25C34 2005

The database hacker’s handbook : defending database servers. (2005). TK
    5105.59 D3

Herold, Rebecca. (2005). Managing an information security and privacy
    awareness and training program. QA 76.9 A25H46

Munro, Iain. (2005). Information warfare in business : strategies of control
   and resistance in the network society. HM 851 M86

Orchard, Leslie M. (2005). Hacking RSS and Atom. QA 76.9 A25O73

Rittinghouse, John W., James F. Ransome. (2005). Business continuity and
     disaster recovery for infosec managers. HF 5548.37 R58

Rittinghouse, John W., James F. Ransome. (2005). IM : instant messaging
     security. TK 5105.73 R58

Whitman, Michael E., Herbert J. Mattord. (2005). Principles of information
        security. 2nd ed. QA 76.9 A25W45 2005

B. MULTIMEDIA (Located at the Electronics Resources Section)
   Haag, Stephen, Paige Baltzan, Amy Phillips. (2008). Business driven
      technology. 2nd ed. 1 CD-ROM. HD 30.2 H32 2008

   O’Brien, James A., George M. Marakas. (2008). Management information
      systems. 8th ed. 1 CD-ROM. T 58.6 O26 2008

   Haag, Stephen. (2007). Management information systems for the information
      age. 2 CD-ROM (4 3/4 in.). 6th ed. T 58.6 H18 2007

   Cannon, David L., Timothy S. Bergmann, Brady Pamplin. (2006). CISA -
      Certified Information Systems Auditor : study guide. 1 CD-ROM. QA
      76.3 C34

   Fitzsimmons, James A. (2006). Service management :operations, strategy
        and information technology. 5th ed. 1 CD-ROM (4 3/4 in.). HD 9980.5
        F549 2006

   Haag, Stephen. (2006). Information systems essentials. 1 CD-ROM. T 58.6

   Schwalbe Kathy. (2006). Information technology project management 4th ed.
      2 CD-ROM HD 30.2 S33 2006


   1.   Gale Virtual Reference Library takes research to the next level by
        delivering great reference print titles electronically. Providing 24/7
        access conveniently. Below are the current E-book titles in the library.

        •   Brand New Brand Thinking, 2002
        •   Brand Royalty, 2004
        •   BrandChild: Insights into the Minds of Today's Global Kids, 2003
        •   Bridging the Culture Gap, 2004
        •   Business Data Communications and Networking: A Research
            Perspective, 2007
        •   Cases on Strategic Information Systems, 2006
        •   Change Game: How Today's Global Trends Are Shaping Tomorrow's
            Companies, 2002
        •   Change Management Excellence, 2004
        •   Corporate Finance Handbook, 3rd ed., 2002
     •   Customer Management Scorecard, 2002
     •   Database Modeling for Industrial Data Management: Emerging
         Technologies and Applications, 2006
     •   E-Business Innovation and Process Management, 2007
     •   e-Procurement in Emerging Economies: Theory and Cases, 2007
     •   Effective Writing Skills for Public Relations, 3rd ed., 2005
     •   Encyclopedia of American Industries, 4th ed., 2v, 2005
     •   Global Brand Strategy: Unlocking Branding Potential Across
         Countries, Cultures and Markets, 2003
     •   Global Logistics and Distribution Planning, 4th ed., 2003
     •   Handbook of Intellectual Property Management: Protecting,
         Developing and Exploiting Your IP Assets, 2004
     •   How to Prepare a Business Plan, 4th ed., 2004
     •   Inside-Out Marketing: How to Create an Internal Marketing Strategy,
     •   International Guide to Management Consultancy, 2nd ed., 2003
     •   Key Account Management, 3rd ed., 2004
     •   Key Marketing Skills: Strategies, Tools and Techniques for
         Marketing Success, 2nd ed., 2004
     •   Knowledge Management Systems: Value Shop Creation, 2007
     •   Leader's Guide to Lateral Thinking Skills, 2003
     •   Learning Maps and Memory Skills, 2nd ed., 2004
     •   Living the Brand, 2nd ed., 2004
     •   Making Sense of Change Management, 2004
     •   Management Consulting in Practice: Award-winning Case Studies,
     •   Marketing Audit Handbook: Tools, Techniques and Checklists to
         Exploit Your Marketing Resources, 2002
     •   Philosophy of Branding: Great Philosophers Think Brands, 2004
     •   Tales for Change: Using Storytelling to Develop People and
         Organizations, 2004
     •   Top Consultant, 4th ed., 2004
     •   Transforming the Company: Manage Change, Compete and Win,
         2nd ed., 2002
     •   Understanding Facilitation: Theory and Principles, 2002
     •   Utilizing and Managing Commerce and Services Online, 2007

2.   Blackwell Encyclopedia of Management
     The Blackwell Encyclopedia of Management Library is comprised
     of 12 volumes, with over 4,400 entries, each covering major subject
     areas. In addition to the 12 volumes of the Blackwell Encyclopedia of
     Management, this database also features a series of Blackwell business
     and management focused handbooks, companions and Strategic
     Management Society titles.

3.   EBSCO Business Source Complete (
     A comprehensive, business periodical database that includes scholarly
     journals and business periodicals covering topics such as management,
     economics, finance, accounting, international business and much more. It
     contains full text sources ranging from general business periodicals such
     as Business Week, Forbes, Fortune, American Banker, etc. to academic
     journals such as Harvard Business Review, Journal of Management,
     Academy of Management Review, Review of Economics & Statistics,
     etc. and provides cumulative indexing and abstracts for 3,010 business
     journals and cumulative full text for over 2,740 journals.

4. Westlaw ( is an online legal research service
   providing quick, easy access to West’s vast collection of statutes, case
   law materials, public records and other legal resources, as well as current
   news articles and business information.

Description: Principles of Information Security by Whitman document sample