It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers i
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition
β Scribed by Thomas R. Peltier
- Year
- 2004
- Tongue
- English
- Leaves
- 371
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Information Security Policies and Procedures: A Practitionerβs Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures. It may be tempting to download some organizationβs policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.
π SIMILAR VOLUMES
It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers in
Everything you need to produce a comprehensive set of policies and procedures. Developed by corporate information security guru Tom Peltier and successfully implemented at numerous Fortune 500 companies, Information Security Policy and Procedures will substantially reduce the time and cost usually a
<P><STRONG>Information Security Policies, Procedures, and Standards: A Practitioner's Reference</STRONG> gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI
<h4>Develop and implement an effective end-to-end security program</h4> <p>Todayβs complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <i>Information Security: The Complete Reference, Second Edition</i> (previously titled