<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu
Information Security Fundamentals, Second Edition
β Scribed by Thomas R. Peltier
- Publisher
- CRC Press
- Year
- 2013
- Tongue
- English
- Leaves
- 424
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterpriseβs effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program.
π SIMILAR VOLUMES
<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In todays technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A comp
<b>Now updatedβyour expert guide to twenty-first century information security</b><p> Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentialit
<h4>Develop and implement an effective end-to-end security program</h4> <p>Todayβs complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <i>Information Security: The Complete Reference, Second Edition</i> (previously titled
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterpriseβs effort to build an effective security program. Following in the footsteps of its bestselling predecessor, <em>Information Security Fundamentals, Second