Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Protection Playbook (Risk Management Portfolio)

Buy

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The Information Protection Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

  • Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standards
  • Draws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive Council
  • Includes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book
(HTML tags aren't allowed.)

A Simple Guide to Office XP
A Simple Guide to Office XP
This book will help you to become acquainted with Office XP and to discover all the new features that have been introduced. Whether you are a beginner or an expert user, this book is meant for you, because it explains all the procedures proposed by Microsoft for you to be able to work quickly and easily. It also suggests expert tips and tricks to...
Assembly Language Programming: ARM Cortex-M3
Assembly Language Programming: ARM Cortex-M3

ARM designs the cores of microcontrollers which equip most "embedded systems" based on 32-bit processors. Cortex M3 is one of these designs, recently developed by ARM with microcontroller applications in mind. To conceive a particularly optimized piece of software (as is often the case in the world of embedded systems) it...

Consultative Selling: The Hanan Formula for High-Margin Sales at High Levels
Consultative Selling: The Hanan Formula for High-Margin Sales at High Levels

"For more than two decades, Consultative Selling(TM) has enabled sales professionals around the world to achieve unprecedented success by helping their clients make more profitable business decisions. The Seventh Edition gives you the tools to continue bringing superior results to 21st Century organizations--and take your own career to a...


Practical Genetic Algorithms
Practical Genetic Algorithms

"The first introductory-level book to emphasize practical applications through the use of example problems."
–– International Journal of General Systems, Vol. 31, No. 1, 2002, on the first edition

The use of genetic algorithms (GAs) to solve large and often complex computational problems has given rise...

Principles of Applied Reservoir Simulation
Principles of Applied Reservoir Simulation
Principles of Applied Reservoir Simulation and its accompanying CD offer users a fully functioning reservoir simulator. Together, the book and CD provide a hands-on introduction to the process of reservoir modeling and show how to apply reservoir simulation technology and principles.

The book begins with a reservoir engineering primer
...
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow

Implement state-of-the-art deep reinforcement learning algorithms using Python and its powerful libraries

Key Features

  • Implement Q-learning and Markov models with Python and OpenAI
  • Explore the power of TensorFlow to build self-learning models
  • Eight AI...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy