𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security Fundamentals, Second Edition

✍ Scribed by Thomas R. Peltier


Publisher
CRC Press
Year
2013
Tongue
English
Leaves
424
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program.


πŸ“œ SIMILAR VOLUMES


Managing Information Security, Second Ed
✍ John R. Vacca πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu

Managing Information Security, Second Ed
✍ John R. Vacca πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu

Information Security Management Principl
✍ Alexander, David; Finch, Amanda; Sutton, David; Taylor, Andy πŸ“‚ Library πŸ“… 2013 πŸ› BCS Learning & Development Ltd 🌐 English

Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In todays technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A comp

Information Security: Principles and Pra
✍ Mark Stamp(auth.) πŸ“‚ Library πŸ“… 2011 🌐 English

<b>Now updatedβ€”your expert guide to twenty-first century information security</b><p> Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentialit

Information Security: The Complete Refer
✍ Mark Rhodes-Ousley πŸ“‚ Library πŸ“… 2013 πŸ› McGraw-Hill Education 🌐 English

<h4>Develop and implement an effective end-to-end security program</h4> <p>Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <i>Information Security: The Complete Reference, Second Edition</i> (previously titled

Information security fundamentals
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 2013 πŸ› Auerbach Publications 🌐 English

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, <em>Information Security Fundamentals, Second