|
Information Security
Scholar Year: 2015/2016 - 1S
Code: |
MSIO10105 |
|
Acronym: |
SI |
Scientific Fields: |
Sistemas e Tecnologias de Informação |
Instance: 2015/2016 - 1S
Courses
Acronym |
Nº of students |
Study Plan |
Curricular year |
ECTS |
Contact hours |
Total Time |
MSIO |
12 |
Study Plain |
1º |
6,0 |
45 |
162,0 |
Docência - ResponsabilidadesTeacher | Responsability |
---|
José Manuel Gaivéo | Head |
|
Teaching language
Portuguese
Objetivos de aprendizagem
Contents
Assement and Attendance registers
Description |
Type |
Tempo (horas) |
End Date |
Subject Classes |
Classes |
0 |
|
|
Total: |
0 |
Main Bibliography
Workman, M., Phelps, D.C. & Gathegi, J.N. ;Information Security for Managers, Jones & Bartlett Learning, 2013 |
ISO/IEC;ISO/IEC 27005 – Information Technology - Security Techniques - Information Security Risk Management, ISO.org, 2008 |
Mamede, H.S. ;Segurança Informática nas Organizações, FCA, 2006 |
Whitman, M.E. & Mattord, H.J. ;Management of Information Security, 3rd Edition, Thomson Course Technology, 2010 |
Whitman, M.E. & Mattord, H.J. ;Principles of Information Security, 4th Edition, Thomson Course Technology, 2011 |
ISO/IEC;ISO/IEC 27002 – Information Technology - Security Techniques - Code of practice for information security controls, ISO.org, 2013 |
ISO/IEC;ISO/IEC 27001 – Information Technology - Security Techniques - Information Security Management Systems - Requirements, ISO.org, 2013 |
OECD;Guidelines for the Security of Information Systems and Networks – Towards a Culture of Security, OECD, 2002 |
ISO;ISO 31000 – Risk Management – Principles and guidelines, International Organization for Standardization, 2009 |
Alexander, D., Finch, A. & Sutton, D. ;Information Security Management Principles, 2nd edition, BCS, 2013 |
Andress, J. ;The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, 2nd Edition, Syngress, 2014 |
ISO/IEC;ISO/IEC 27000 – Information Technology - Security Techniques - Information Security Management Systems – Overview and vocabulary, ISO.org, 2014 |
Complementary Bibliography
GAISP;Generally Accepted Information Security Principles, Version 3.0, Information Systems Security Association (ISSA), 2003 |
Boudriga, N. & Hamdi, M. (ed.) ;Security Engineering Techniques and Solutions for Information Systems: Management and Implementation, Information Science Publishing, 2012 |
Correia, M.P. e Sousa, P.J. ;Segurança no Software, FCA, 2010 |
Peltier, T.R. ;Information Security Risk Analysis, 3rd edition, Auerbach Publications, 2010 |
Zúquete, A.;Segurança em Redes Informáticas, FCA, 2006 |
Santos, P., Bessa, R. e Pimentel, C.;Ciberwar: o Fenómeno, as Tecnologias e os Actores, FCA, 2008 |
Smith, R.E.;Elementary Information Security, Jones & Bartlett Learning, 2011 |
Bowen, P., Hash, J., & Wilson, M. ;Information Security Handbook: A Guide for Managers, National Institute of Standards and Technology, Technology Administration - U.S. Department of Commerce, 2006 |
Boyle, R.J. & Panko, R. ;Corporate Computer Security, 3rd edition, Prentice Hall, 2012 |
Winkler, V.(J.R.) ;Securing the Cloud: Cloud Computer Security Techniques and Tactics, Syngress, 2011 |
Hayden, L. ;IT Security Metrics: A Practical Framework for Measuring Security & Protecting Da, McGraw-Hill Osborne Media, 2010 |
Chew, E., Swanson, M., Stine, K., Bartol, N., Brown, A., & Robinson, W. ;Performance Measurement Guide for Information Security, National Institute of Standards and Technology, Technology Administration - U.S. Department of Commerce, 2008 |
Carneiro, A. ;Introdução à Segurança dos Sistemas de Informação, FCA, 2002 |
Wong, C.;Security Metrics, A Beginner's Guide, McGraw-Hill Osborne Media, 2011 |
Scarfone, K., Souppaya, M., Cody, A., & Orebaugh, A.;Technical Guide to Information Security Testing and Assessment, National Institute of Standards and Technology, Technology Administration - U.S. Department of Commerce, 2008 |
Calder, A. & Watkins, S.G.;IT Governance – An international guide to data security and ISO27001/ISO27002, 5th edition, Kogan Page, 2012 |
Stapleton, J.J.;Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity, Auerbach Publications, 2014 |
Hadnagy, C. & Wilson, P. ;Social Engineering: The Art of Human Hacking, Wiley Publishing, Inc., 2011 |
Quinn, M. ;Ethics for the Information Age, 5th Edition, Addison-Wesley, 2012 |
Rhodes-Ousley, M.;Information Security - The Complete Reference, 2nd Edition, McGraw-Hill Osborne Media, 2013 |
Merkow, M.S. & Breithaupt, J. ;Information Security: Principles and Practices, 2nd Edition (Certification/Training), Pearson IT Certification, 2014 |
National Institute of Standards and Technology;An Introduction to Computer Security: The NIST Handbook, NIST Special Publication 800-12, Technology Administration - U.S. Department of Commerce, 1998 |
Floridi, L.;The Ethics of Information, Oxford University Press, 2013 |
Hoyt, R.E., Bailey, N. & Yoshihashi, A. (ed.);Health Informatics: Pratical Guide for Healthcare and Information Technology Professionals, 5th edition, Iuiu.com, 2012 |
Reynolds, G.W. ;Ethics in Information Technology, Course Technology, Cengage Learning, 2012 |
|
|