𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security Handbook

✍ Scribed by Darren Death


Publisher
Packt Publishing
Year
2017
Tongue
English
Leaves
419
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Implement information security effectively as per your organization’s needs.

Key Features

  • Learn to build your own information security framework, the best fit for your organization
  • Build on the concepts of threat modeling, incidence response, and security analysis
  • Practical use cases and best practices for information security

Book Description

Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it’s important.

It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you’ll discover some best practices that can be implemented to make your security framework strong.

By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization’s requirements.

What you will learn

  • Develop your own information security framework
  • Build your incident response mechanism
  • Discover cloud security considerations
  • Get to know the system development life cycle
  • Get your security operation center up and running
  • Know the various security testing types
  • Balance security as per your business needs
  • Implement information security best practices

Who This Book Is For

This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you.

Table of Contents

  1. Information and Data Security Fundamentals
  2. Threat Modeling
  3. Preparing for Information Security
  4. Information Security Risk Management
  5. Developing your Information and Data Security Plan
  6. Continuous Security Testing and Monitoring
  7. Business Continuity / Disaster Recovery Planning
  8. Incident Response Planning
  9. Developing a Security Operations Center
  10. Developing a Security Architecture Program
  11. Cloud Security Considerations
  12. Information Security Best Practices

✦ Subjects


Design & Architecture;Hardware & DIY;Computers & Technology;Network Administration;Disaster & Recovery;Email Administration;Linux & UNIX Administration;Storage & Retrieval;Windows Administration;Networking & Cloud Computing;Computers & Technology;Cloud Computing;Networking & Cloud Computing;Computers & Technology


πŸ“œ SIMILAR VOLUMES


Information Security Handbook
✍ Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, JoΓ£o M πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English
Information Security Handbook
✍ Noor Zaman Jhanjhi; Khalid Hussain; Mamoona Humayun; Azween Bin Abdullah; JoΓ£o M πŸ“‚ Library πŸ› CRC Press 🌐 English

This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains. Information Security

Information security management handbook
✍ Harold F. Tipton, Micki Krause (editors) πŸ“‚ Library πŸ“… 2008 πŸ› Auerbach Publications 🌐 English

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati

Information security management handbook
✍ Harold F. Tipton, Micki Krause (editors) πŸ“‚ Library πŸ“… 2001 πŸ› Auerbach Publications 🌐 English

Whether you are active in security management or studying for the CISSP exam, you need accurate information you can trust. A practical reference and study guide, <em>Information Security Management Handbook, Fourth Edition, Volume 3</em> prepares you not only for the CISSP exam, but also for your wo

Information security management handbook
✍ Harold F. Tipton, Micki Krause (editors) πŸ“‚ Library πŸ“… 2008 πŸ› Auerbach Publications 🌐 English

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati

Handbook of information security,
✍ Hossein Bidgoli πŸ“‚ Library πŸ“… 2006 πŸ› Wiley 🌐 English

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat