Peltier Information Security Fundamentals
Buch, Englisch,
438 Seiten, Kartoniert, Format (B × H): 236 mm x 152 mm, Gewicht: 630 g
2. New Auflage 2013,
438 Seiten, Kartoniert, Format (B × H): 236 mm x 152 mm, Gewicht: 630 g
ISBN: 978-1-4398-1062-0
Verlag: Taylor & Francis Inc
Seite exportieren
- versandkostenfreie Lieferung
- Lieferfrist: bis zu 10 Tage
Includes ten new chapters
Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements
Expands its coverage of compliance and governance issues
Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks
Presents new information on mobile security issues
Reorganizes the contents around ISO 27002
The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management.The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.
Developing Policies; Thomas R. PeltierOrganization of Information Security; Patrick D. HowardCryptology; Maria DaileyRisk Management: The Facilitated Risk Analysis and Assessment Process; Thomas R. PeltierBuilding and Maintaining an Effective Security Awareness Program; John G. O’LearyPhysical Security; John A. BlackleyDisaster Recovery and Business Continuity Planning; Kevin McLaughlinContinuity of Operations Planning; Jeffery SauntryAccess Controls; Kimberly LoganInformation System Development, Acquisition, and Maintenance; Quinn R. ShamblinInformation Security Incident Management; Brad SmithAsset Classification; Thomas R. Peltier and William TompkinsThreats to Information Security; Justin PeltierInformation Security Policies: A Practitioner’s View; Charles JohnsonGlossaryAppendix A: Facilitated Risk Analysis and Assessment Process (FRAAP)Appendix B: Business Impact Analysis; Kevin McLaughlin
Information security management professionals, business continuity planners, systems administrators, network managers, anyone new to information security, people with information security training needs, two- and four-year college programs in IT and business management.
Includes ten new chapters
Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements
Expands its coverage of compliance and governance issues
Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks
Presents new information on mobile security issues
Reorganizes the contents around ISO 27002
The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management.The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.
Developing Policies; Thomas R. PeltierOrganization of Information Security; Patrick D. HowardCryptology; Maria DaileyRisk Management: The Facilitated Risk Analysis and Assessment Process; Thomas R. PeltierBuilding and Maintaining an Effective Security Awareness Program; John G. O’LearyPhysical Security; John A. BlackleyDisaster Recovery and Business Continuity Planning; Kevin McLaughlinContinuity of Operations Planning; Jeffery SauntryAccess Controls; Kimberly LoganInformation System Development, Acquisition, and Maintenance; Quinn R. ShamblinInformation Security Incident Management; Brad SmithAsset Classification; Thomas R. Peltier and William TompkinsThreats to Information Security; Justin PeltierInformation Security Policies: A Practitioner’s View; Charles JohnsonGlossaryAppendix A: Facilitated Risk Analysis and Assessment Process (FRAAP)Appendix B: Business Impact Analysis; Kevin McLaughlin
Information security management professionals, business continuity planners, systems administrators, network managers, anyone new to information security, people with information security training needs, two- and four-year college programs in IT and business management.
- versandkostenfreie Lieferung
67,50 € (inkl. MwSt.)
Aufgrund der Corona-Krise kann es in Einzelfällen zu deutlich längeren Lieferzeiten kommen.
Webcode: sack.de/1a6rt