Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Fundamentals, Second Edition

Buy

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.

The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program.

  • Includes ten new chapters
  • Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements
  • Expands its coverage of compliance and governance issues
  • Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks
  • Presents new information on mobile security issues
  • Reorganizes the contents around ISO 27002

The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management.

The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.

(HTML tags aren't allowed.)

Eric Hobsbawm: A Life in History
Eric Hobsbawm: A Life in History
Eric Hobsbawm's works have had a nearly incalculable effect across generations of readers and students, influencing more than the practice of history but also the perception of it. Born in Alexandria, Egypt, of second-generation British parents, Hobsbawm was orphaned at age fourteen in 1931. Living with an uncle in Berlin, he...
Data and Applications Security XVII: Status and Prospects
Data and Applications Security XVII: Status and Prospects
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new...
Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
This is a comprehensive book covering the essentials of SCADA communication systems focusing on
DNP3 and the other new developments in this area. It commences with a brief review of the
fundamentals of SCADA systems hardware, software and the typical communications systems (such
as RS-232, RS-485, Ethernet and TCP/IP) that connect
...

Cocoa Programming for Mac OS X For Dummies (Computer/Tech)
Cocoa Programming for Mac OS X For Dummies (Computer/Tech)
Cocoa programming is not only the favored development environment for Mac OS X, it’s also a primary tool for creating iPhone and iPod Touch software. That makes this a great time to learn Cocoa, and Cocoa Programming for Mac OS X For Dummies is the ideal place to start!

This book gives you a solid foundation in Cocoa and the...

C++ Programming: Program Design Including Data Structures
C++ Programming: Program Design Including Data Structures

WELCOME TO THE FOURTH EDITION OF C++ Programming: Program Design Including Data Structures. Designed for a two semester (CS1 and CS2) C++ course, this text will provide a breath of fresh air to you and your students. The CS1 and CS2 courses serve as the cornerstone of the Computer Science curriculum. My primary goal is to motivate and...

Pocket Medicine: The Massachusetts General Hospital Handbook of Internal Medicine (Pocket Notebook Series)
Pocket Medicine: The Massachusetts General Hospital Handbook of Internal Medicine (Pocket Notebook Series)

Prepared by residents and attending physicians at Massachusetts General Hospital, this pocket-sized looseleaf is one of the best-selling references for medical students, interns, and residents on the wards and candidates reviewing for internal medicine board exams. In bulleted lists, tables, and algorithms, Pocket Medicine...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy