Wellcome

Building a practical information security program / Jason Andress, CISSP, ISSAP, CISM, GPEN, Mark Leary, CISSP, CISM, CGIET, PMP.

By: Andress, Jason [author.]Contributor(s): Leary, Mark [author.]Material type: TextTextPublication details: Cambridge, MA : Syngress, �2017Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9780128020883; 0128020881Subject(s): Computer networks -- Security measures | Information storage and retrieval systems -- Security measures | Computer security | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Computer networks -- Security measures | Computer security | Information storage and retrieval systems -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: No titleDDC classification: 005.8 LOC classification: TK5105.59Online resources: ScienceDirect
Contents:
Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.
Summary: Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode
Ebooks Ebooks Mysore University Main Library
Not for loan EBKELV510

Includes bibliographical references and index.

Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.

Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.

There are no comments on this title.

to post a comment.

No. of hits (from 9th Mar 12) :

Powered by Koha