Building a practical information security program / [electronic resource]
by Andress, Jason [author.]; Leary, Mark [author.].
Material type: BookPublisher: Cambridge, MA : Syngress, �2017Description: 1 online resource.ISBN: 9780128020883; 0128020881.Subject(s): Computer networks -- Security measures | Information storage and retrieval systems -- Security measures | Computer security | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Computer networks -- Security measures | Computer security | Information storage and retrieval systems -- Security measures | Electronic booksOnline resources: ScienceDirect
Contents:
Summary: Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.
Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.
No physical items for this record
Includes bibliographical references and index.
Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.
Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.
There are no comments for this item.