|
|
|
|
LEADER |
03861nam a22003975i 4500 |
001 |
978-1-4842-1685-9 |
003 |
DE-He213 |
005 |
20171007011217.0 |
007 |
cr nn 008mamaa |
008 |
161201s2016 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484216859
|9 978-1-4842-1685-9
|
024 |
7 |
|
|a 10.1007/978-1-4842-1685-9
|2 doi
|
040 |
|
|
|d GrThAP
|
100 |
1 |
|
|a Campbell, Tony.
|e author.
|
245 |
1 |
0 |
|a Practical Information Security Management
|h [electronic resource] :
|b A Complete Guide to Planning and Implementation /
|c by Tony Campbell.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2016.
|
300 |
|
|
|a XXVII, 237 p. 31 illus., 24 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter 1: Evolution of a Profession -- Chapter 2: Threats and Vulnerabilities -- Chapter 3: Introducing the Security Manager -- Chapter 4: Information Security as a Business Function -- Chapter 5: Information Security Implementation -- Chapter 6: Standards Frameworks Guidelines and Legislation -- Chapter 7: Protection of Information -- Chapter 8: Protection of People -- Chapter 9: Protection of Premises -- Chapter 10: Protection of Systems -- Chapter 11: Digital Evidence and Incident Response -- Chapter 12: Cloud Computing Security -- Chapter 13: Industrial Control Systems -- Chapter 14: Secure Systems Development.
|
520 |
|
|
|a This book provides a wealth of practical advice for anyone responsible for information security management in the workplace. Focusing on the ‘how’ rather than the ‘what’, Practical Information Security Management shows you how to create security-focused business propositions that consider the balance between cost, risk and usability. The book accompanies you on your journey as you set out on the path to become an information security manager, offering a wealth of background history that explains how the industry works today, looking at how you set up an effective infosec practice, hire the right people and strike the balance between security controls, costs and risk. Together we’ll cut through the policies, regulations and standards to expose the real inner workings of what make a security management program effective, covering the full gamut of subject matter pertaining to security management: organizational structures, security architectures, technical controls, governance frameworks, and operational security matters. What You Will Learn: The practical aspects of being an effective information security manager How to strike the right balance between cost and risk How to take security policies and standards and make them work in reality How to leverage complex security functions, such as Digital Forensics, Incident Response and Security Architecture Who This Book is For: This is a book for anyone who wants to make a difference in offering effective security management for their business. You might already be a security manager seeking insight into areas of the job that you’ve not looked at before, or you might be a techie or risk guy wanting to switch into this challenging new career. Whatever your career goals are, Practical Information Security Management has something to offer you.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer software
|x Reusability.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Performance and Reliability.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484216842
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4842-1685-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|