Import It All
Books > Business & Money > Economics > Commerce
Information Security Fundamentals

Information Security Fundamentals

Product ID: 25620727 Condition: New

Payflex: Pay in 4 interest-free payments of R810.25. Learn more
R 3,241
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow

Product Description

Information Security Fundamentals

  • Used Book in Good Condition

<P>Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, <STRONG>Information Security Fundamentals, Second Edition </STRONG>provides<STRONG> </STRONG>information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.<BR><BR>The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program.</P> <UL> <LI>Includes ten new chapters</LI> <LI>Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements</LI> <LI>Expands its coverage of compliance and governance issues</LI> <LI>Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks</LI> <LI>Presents new information on mobile security issues</LI> <LI>Reorganizes the contents around ISO 27002</LI> <P></P></UL> <P>The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management.<BR><BR>The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.</P>

Technical Specifications

Country
USA
Brand
CRC Press
Manufacturer
Auerbach Publications
Binding
Paperback
ItemPartNumber
13 Tables, black and white; 103 Illustra
Model
13 Tables, black and white; 103 Illustra
ReleaseDate
2013-10-18T00:00:01Z
UnitCount
1
EANs
9781439810620

You might also like

Back to top