Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Protection Playbook (Risk Management Portfolio)

Buy

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The Information Protection Playbook is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

  • Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standards
  • Draws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive Council
  • Includes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book
(HTML tags aren't allowed.)

Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers,...
Validation and Verification of Automated Systems: Results of the ENABLE-S3 Project
Validation and Verification of Automated Systems: Results of the ENABLE-S3 Project
The book summarizes the main results of the the project ENABLE-S3 covering the following aspects: validation and verification technology bricks (collection and selection of test scenarios, test executions envionments incl. respective models, assessment of test results), evaluation of technology bricks in selected use cases and standardization...
Scala for Java Developers
Scala for Java Developers

Build reactive, scalable applications and integrate Java code with the power of Scala

Overview

  • Learn the syntax interactively to smoothly transition to Scala by reusing your Java code
  • Leverage the full power of modern web programming by building scalable and reactive applications
  • ...

Professional SharePoint 2013 Development
Professional SharePoint 2013 Development

Thorough coverage of development in SharePoint 2013

A team of well-known Microsoft MVPs joins forces in this fully updated resource, providing you with in-depth coverage of development tools in the latest iteration of the immensely popular SharePoint. From building solutions to building custom workflow and content management...

Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
The popularity of multimedia content has led to the widespread distribution and consumption of digital multimedia data. As a result of the relative ease with which individuals may now alter and repackage digital content, ensuring that media content is employed by authorized users for its intended purpose is becoming an issue of eminent importance...
Optimizing Hadoop for MapReduce
Optimizing Hadoop for MapReduce

This book is the perfect introduction to sophisticated concepts in MapReduce and will ensure you have the knowledge to optimize job performance. This is not an academic treatise; it's an example-driven tutorial for the real world.

Overview

  • Optimize your MapReduce job performance
  • ...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy