Search Books
Microcontrollers: Fundament… The Garbage Collection Hand…

Information Security Management: Concepts and Practice

Author Bel G. Raggad
Publisher CRC Press
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
26.29 97.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $26.41

✓ Usually ships in 1-2 business days

Share:
Book Details
Author(s)Bel G. Raggad
PublisherCRC Press
ISBN / ASIN1420078542
ISBN-139781420078541
AvailabilityUsually ships in 1-2 business days
Sales Rank1,913,425
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.

An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.

This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View