𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security Policies, Procedures, and Standards: A Practitioner’s Reference

✍ Scribed by Douglas J. Landoll


Publisher
Auerbach Publications, CRC
Year
2016
Tongue
English
Leaves
246
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.

The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely.

Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

✦ Subjects


Leadership;Management & Leadership;Business & Money;Management;Management & Leadership;Business & Money;Network Security;Networking & Cloud Computing;Computers & Technology;Security & Encryption;Cryptography;Encryption;Hacking;Network Security;Privacy & Online Safety;Security Certifications;Viruses;Computers & Technology;Management;Business & Finance;New, Used & Rental Textbooks;Specialty Boutique;Computer Science;Algorithms;Artificial Intelligence;Database Storage & Design;Graphics & Visualizat


πŸ“œ SIMILAR VOLUMES


Information Security Policies and Proced
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 1998 πŸ› Auerbach Publications 🌐 English

It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers i

Information Security Policies and Proced
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 1998 πŸ› Auerbach Publications 🌐 English

It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers in

Information Security Policies and Proced
✍ Dimitris N. Chorafas πŸ“‚ Library πŸ“… 1998 πŸ› Auerbach Publications 🌐 English

Everything you need to produce a comprehensive set of policies and procedures. Developed by corporate information security guru Tom Peltier and successfully implemented at numerous Fortune 500 companies, Information Security Policy and Procedures will substantially reduce the time and cost usually a

Information Security Policies and Proced
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 2004 🌐 English

Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security referen

Information Security Policies, Procedure
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 2001 πŸ› Auerbach Publications 🌐 English

Information security policies and all of in this book. This is a great advice for business to start, continue, follow on their journey. Thomas has captured the essence of what the business of all levels want to know when it comes to developing IT policies and systems. This book is must read for all

Information Security Policies, Procedure
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 2001 🌐 English

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business ob