Ingyenes szállítás a Packetával, 19 990 Ft feletti vásárlás esetén
Posta 1 795 Ft DPD 1 995 Ft PostaPont / Csomagautomata 1 690 Ft Postán 1 690 Ft GLS futár 1 590 Ft Packeta 990 Ft

Security Program and Policies

Nyelv AngolAngol
Könyv Puha kötésű
Könyv Security Program and Policies Sari Greene
Libristo kód: 01986933
Kiadó Pearson Education, március 2014
Everything you need to know about information security programs and policies, in one book * Clearly... Teljes leírás
? points 214 b
33 307 Ft
50 % esély Keressük az egész világon Mikor kapom meg a terméket?

30 nap a termék visszaküldésére


Ezt is ajánljuk


toplistás
Atlas of Brutalist Architecture Phaidon Press / Kemény kötésű
common.buy 24 831 Ft
Predator: The Official Movie Novelization Christopher Golden / Puha kötésű
common.buy 3 712 Ft
Vegan Cakes and Other Bakes Jerome Eckmeier / Kemény kötésű
common.buy 6 017 Ft
Principles of Game Audio and Sound Design SINCLAIR / Puha kötésű
common.buy 23 723 Ft
The Histories of Middle-Earth John Ronald Reuel Tolkien / Puha kötésű
common.buy 17 891 Ft
Introduction to Market Access for Pharmaceuticals Mondher Toumi / Puha kötésű
common.buy 65 696 Ft
Hunting Party Lucy Foley / Puha kötésű
common.buy 6 860 Ft
Imagining Autism Sonya Freeman Loftis / Kemény kötésű
common.buy 6 780 Ft

Everything you need to know about information security programs and policies, in one book * Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management * Thoroughly updated for today's challenges, laws, regulations, and best practices * The perfect resource for anyone pursuing an information security management career In today's dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them. Complete and easy to understand, it explains key concepts and techniques through real-life examples. You'll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business. If you understand basic information security, you're ready to succeed with this book. You'll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program. Sari Stern Greene, CISSP, CRISC, CISM, NSA/IAM, is an information security practitioner, author, and entrepreneur. She is passionate about the importance of protecting information and critical infrastructure. Sari founded Sage Data Security in 2002 and has amassed thousands of hours in the field working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Her first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, which was soon followed by the first edition of Security Policies and Procedures: Principles and Practices. She is actively involved in the security community, and speaks regularly at security conferences and workshops. She has been quoted in The New York Times, Wall Street Journal, and on CNN, and CNBC. Since 2010, Sari has served as the chair of the annual Cybercrime Symposium. Learn how to * Establish program objectives, elements, domains, and governance * Understand policies, standards, procedures, guidelines, and plans-and the differences among them * Write policies in "plain language," with the right level of detail * Apply the Confidentiality, Integrity & Availability (CIA) security model * Use NIST resources and ISO/IEC 27000-series standards * Align security with business strategy * Define, inventory, and classify your information and systems * Systematically identify, prioritize, and manage InfoSec risks * Reduce "people-related" risks with role-based Security Education, Awareness, and Training (SETA) * Implement effective physical, environmental, communications, and operational security * Effectively manage access control * Secure the entire system development lifecycle * Respond to incidents and ensure continuity of operations * Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS

Ajándékozza oda ezt a könyvet még ma
Nagyon egyszerű
1 Tegye a kosárba könyvet, és válassza ki a kiszállítás ajándékként opciót 2 Rögtön küldjük Önnek az utalványt 3 A könyv megérkezik a megajándékozott címére

Belépés

Bejelentkezés a saját fiókba. Még nincs Libristo fiókja? Hozza létre most!

 
kötelező
kötelező

Nincs fiókja? Szerezze meg a Libristo fiók kedvezményeit!

A Libristo fióknak köszönhetően mindent a felügyelete alatt tarthat.

Libristo fiók létrehozása