| This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.
* Six new chapters present the latest information and resources to counter information security threats * Every chapter contains opening objectives and closing summaries to clarify key points * Accessible, easy-to-read style for the busy professional
Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need.
Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information security program, and additional metrics to measure organization performance. It also includes six entirely new chapters on emerging trends such as high-tech fraud, investigative support for law enforcement, national security concerns, and information security consulting.
This essential guide covers everything from effective communication to career guidance for the information security officer. You'll turn to it again and again for practical information and advice on establishing and managing a successful information protection program.
About the Author Dr. Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security experience in both government as a special agent and as a manager in international corporations. Dr. Kovacich currently resides on an island in Washington state where he continues to write, lecture and conduct research relative to information systems security, information warfare defensive and offensive operations, high-technology crime and techno-terrorism.
|
|
|
| | High Performance Computing on Vector Systems 2007The book presents the state-of-the-art in high performance computing and simulation on modern supercomputer architectures. It covers trends in hardware and software development in general and specifically the future of vector-based systems and heterogeneous architectures. The application contributions cover computational fluid dynamics,... | | |
LinkedIn For Dummies (Computer/Tech)Once you're LinkedIn, you're part of the largest online network of professionals in the world! When you know how to make the most of your profile, manage your contacts, and handle invitations effectively, you'll go far. This book is packed with advice that will help you market yourself and find a job, an employee, an investor, or more business for... | | Objective-C Fundamentals
Summary
Objective-C Fundamentals is a hands-on tutorial that leads you from your first line of Objective-C code through the process of building native apps for the iPhone using the latest version of the SDK. You'll learn to avoid the most common pitfalls, while exploring the expressive Objective-C... | | Pairing-Based Cryptography Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science)This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents... |
|