Managing Information Security

Edited by

  • John Vacca, Renowned author of Computer and Information Security Handbook 2E ISBN: 9780123943972

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
View full description


Information security practitioners at the managerial, operational and technical levels. Job titles include IT Manager, Information Security Officer, IT Security Analyst, Security Auditor, etc..


Book information

  • Published: September 2013
  • Imprint: SYNGRESS
  • ISBN: 978-0-12-416688-2

Table of Contents

Ch 1. Information Security Essentials for IT Managers
Ch 2. Security Management Systems
Ch 3. Information Technology Security Management
Ch 4. Online Identity and User Management Services
Ch 5. Intrusion Prevention and Detection Systems
Ch 6. Firewalls
Ch 7. Penetration Testing
Ch 8. What is Vulnerability Assessment?
Ch 9. Cyber Forensics
Ch 10. Cyber Forensics and Incident Response
Ch 11. Network Forensics