This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors?โ wealth of valuable experience in high-risk com
A Practical Guide to Managing Information Security
โ Scribed by Steve Purser
- Publisher
- Artech Print on Demand
- Year
- 2004
- Tongue
- English
- Leaves
- 281
- Series
- Artech House Technology Management Library
- Edition
- illustrated edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need to align the information security process as a whole with the requirements of the modern enterprise, which involves empowering business managers to manage information security-related risk. Throughout, the book places emphasis on the use of simple, pragmatic risk management as a tool for decision-making. The first book to cover the strategic issues of IT security, it helps you to: understand the difference between more theoretical treatments of information security and operational reality; learn how information security risk can be measured and subsequently managed; define and execute an information security strategy design and implement a security architecture; and ensure that limited resources are used optimally.
๐ SIMILAR VOLUMES
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how
<p><p></p><p>Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book f
โข Examines the impact of both accidental and malicious, intentional action and inaction โข Defines the five major components of a comprehensive and effective program โข Introduces the concept of IA integrity levels and provides a complete methodology for information security/IA throughout the life o