Hopp til hovedinnhold

Klikk her for å se avvik og utvikling i leveransene våre (sist oppdatert 8. september)

Omslagsbilde

Information Security Policies and Procedures : A Practitioner's Reference, Second Edition

Peltier, Thomas R.

Innbundet

Produseres på bestilling

Leveringstid: 2-4 uker

Handlinger

Beskrivelse

Omtale

Information Security Policies and Procedures: A Practitioners Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures. It may be tempting to download some organizations policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.

  • Utgivelsesdato:

    11.06.2004

  • ISBN/Varenr:

    9780849319587

  • Språk:

    , Engelsk

  • Forlag:

    Auerbach

  • Fagtema:

    Data- og informasjonsteknologi

  • Litteraturtype:

    Faglitteratur

  • Utgave:

    2

  • Sider:

    408

  • Høyde:

    23.3 cm

  • Bredde:

    16.5 cm

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

9780367386412 Heftet
05.09.2019
Engelsk

Produseres på bestilling
Managing A Network Vulnerability Assessment

Managing A Network Vulnerability Assessment

9781138436886 Innbundet
27.07.2017
Engelsk

Produseres på bestilling
Information Security Fundamentals

Information Security Fundamentals

9781138436893 Innbundet
27.07.2017
Engelsk

Produseres på bestilling
Information Security Fundamentals

Information Security Fundamentals

9781439810620 Heftet
16.10.2013
Engelsk

I salg
Information Security Risk Analysis

Information Security Risk Analysis

9781439839560 Innbundet
16.03.2010
Engelsk

Produseres på bestilling
How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

9781420062755 Innbundet
18.11.2008
Engelsk

Produseres på bestilling
Complete Guide to CISM Certification

Complete Guide to CISM Certification

9780849353567 Innbundet
13.12.2006
Engelsk

Produseres på bestilling
Managing A Network Vulnerability Assessment

Managing A Network Vulnerability Assessment

9780849312700 Heftet
28.05.2003
Engelsk

Produseres på bestilling