Esta Página em Português  

Go to: Main Menu, Content, Opções, Login.

Contextual Help  
Homepage
You are in: Start > > Courses > Disciplinas > MSIO10105
Main Menu
Authentication





Esqueceu a sua senha de acesso?

Information Security

Scholar Year: 2015/2016 - 1S

Code: MSIO10105    Acronym: SI
Scientific Fields: Sistemas e Tecnologias de Informação

Instance: 2015/2016 - 1S

Secção: Department of Information Systems

Courses

Acronym Nº of students Study Plan Curricular year ECTS Contact hours Total Time
MSIO 12 Study Plain 6,0 45 162,0

Docência - Horas

Theoretical-practical : 3

Type Teacher Classes Hours
Theoretical-practical Totals 1 3,00
José Gaivéo   3,00


Docência - Responsabilidades

TeacherResponsability
José Manuel GaivéoHead

Teaching weeks: 15

Teaching language

Portuguese

Objetivos de aprendizagem

Contents


Assement and Attendance registers

Description Type Tempo (horas) End Date
Subject Classes  Classes  0
  Total: 0

Main Bibliography

Workman, M., Phelps, D.C. & Gathegi, J.N. ;Information Security for Managers, Jones & Bartlett Learning, 2013
ISO/IEC;ISO/IEC 27005 – Information Technology - Security Techniques - Information Security Risk Management, ISO.org, 2008
Mamede, H.S. ;Segurança Informática nas Organizações, FCA, 2006
Whitman, M.E. & Mattord, H.J. ;Management of Information Security, 3rd Edition, Thomson Course Technology, 2010
Whitman, M.E. & Mattord, H.J. ;Principles of Information Security, 4th Edition, Thomson Course Technology, 2011
ISO/IEC;ISO/IEC 27002 – Information Technology - Security Techniques - Code of practice for information security controls, ISO.org, 2013
ISO/IEC;ISO/IEC 27001 – Information Technology - Security Techniques - Information Security Management Systems - Requirements, ISO.org, 2013
OECD;Guidelines for the Security of Information Systems and Networks – Towards a Culture of Security, OECD, 2002
ISO;ISO 31000 – Risk Management – Principles and guidelines, International Organization for Standardization, 2009
Alexander, D., Finch, A. & Sutton, D. ;Information Security Management Principles, 2nd edition, BCS, 2013
Andress, J. ;The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, 2nd Edition, Syngress, 2014
ISO/IEC;ISO/IEC 27000 – Information Technology - Security Techniques - Information Security Management Systems – Overview and vocabulary, ISO.org, 2014

Complementary Bibliography

GAISP;Generally Accepted Information Security Principles, Version 3.0, Information Systems Security Association (ISSA), 2003
Boudriga, N. & Hamdi, M. (ed.) ;Security Engineering Techniques and Solutions for Information Systems: Management and Implementation, Information Science Publishing, 2012
Correia, M.P. e Sousa, P.J. ;Segurança no Software, FCA, 2010
Peltier, T.R. ;Information Security Risk Analysis, 3rd edition, Auerbach Publications, 2010
Zúquete, A.;Segurança em Redes Informáticas, FCA, 2006
Santos, P., Bessa, R. e Pimentel, C.;Ciberwar: o Fenómeno, as Tecnologias e os Actores, FCA, 2008
Smith, R.E.;Elementary Information Security, Jones & Bartlett Learning, 2011
Bowen, P., Hash, J., & Wilson, M. ;Information Security Handbook: A Guide for Managers, National Institute of Standards and Technology, Technology Administration - U.S. Department of Commerce, 2006
Boyle, R.J. & Panko, R. ;Corporate Computer Security, 3rd edition, Prentice Hall, 2012
Winkler, V.(J.R.) ;Securing the Cloud: Cloud Computer Security Techniques and Tactics, Syngress, 2011
Hayden, L. ;IT Security Metrics: A Practical Framework for Measuring Security & Protecting Da, McGraw-Hill Osborne Media, 2010
Chew, E., Swanson, M., Stine, K., Bartol, N., Brown, A., & Robinson, W. ;Performance Measurement Guide for Information Security, National Institute of Standards and Technology, Technology Administration - U.S. Department of Commerce, 2008
Carneiro, A. ;Introdução à Segurança dos Sistemas de Informação, FCA, 2002
Wong, C.;Security Metrics, A Beginner's Guide, McGraw-Hill Osborne Media, 2011
Scarfone, K., Souppaya, M., Cody, A., & Orebaugh, A.;Technical Guide to Information Security Testing and Assessment, National Institute of Standards and Technology, Technology Administration - U.S. Department of Commerce, 2008
Calder, A. & Watkins, S.G.;IT Governance – An international guide to data security and ISO27001/ISO27002, 5th edition, Kogan Page, 2012
Stapleton, J.J.;Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity, Auerbach Publications, 2014
Hadnagy, C. & Wilson, P. ;Social Engineering: The Art of Human Hacking, Wiley Publishing, Inc., 2011
Quinn, M. ;Ethics for the Information Age, 5th Edition, Addison-Wesley, 2012
Rhodes-Ousley, M.;Information Security - The Complete Reference, 2nd Edition, McGraw-Hill Osborne Media, 2013
Merkow, M.S. & Breithaupt, J. ;Information Security: Principles and Practices, 2nd Edition (Certification/Training), Pearson IT Certification, 2014
National Institute of Standards and Technology;An Introduction to Computer Security: The NIST Handbook, NIST Special Publication 800-12, Technology Administration - U.S. Department of Commerce, 1998
Floridi, L.;The Ethics of Information, Oxford University Press, 2013
Hoyt, R.E., Bailey, N. & Yoshihashi, A. (ed.);Health Informatics: Pratical Guide for Healthcare and Information Technology Professionals, 5th edition, Iuiu.com, 2012
Reynolds, G.W. ;Ethics in Information Technology, Course Technology, Cengage Learning, 2012
Options
Página gerada em: 2024-05-21 às 05:16:51