Information Security Management Principles
David Alexander,Amanda Finch,David Sutton,Andy Taylor, Andy Taylor
- 268 pages
- English
- ePUB (adapté aux mobiles)
- Disponible sur iOS et Android
Information Security Management Principles
David Alexander,Amanda Finch,David Sutton,Andy Taylor, Andy Taylor
Ă propos de ce livre
In today's technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts.
Written in an accessible manner, Information SecurityManagement Principles provides practical guidance and actionable steps to better prepare your workplace and your home alike, and keep your information secure. This book is a primer for those new to the subject as well as a guide for more experienced practitioners. It explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen.
This third edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. It also includes updates to the BCS Certification in Information Security Management Principles, which this book supports.
- A valuable guide to both current professionals at all levels and those wishing to embark on an information security career
- Offers practical guidance and actionable steps for individuals and businesses to protect themselves
- Highly accessible and terminology is clearly explained and supported with current, real-world examples
Foire aux questions
Informations
Table des matiĂšres
- Front Cover
- Half-Title Page
- BCS, THE CHARTERED INSTITUTE FOR IT
- Title Page
- Copyright Page
- Contents
- Figures and tables
- Authors
- Acknowledgements
- Abbreviations
- Preface
- 1. Information Security Principles
- 2. Information Risk
- 3. Information Security Framework
- 4. Security Life Cycles
- 5. Procedural and People Security Controls
- 6.Technical Security Controls
- 7. Physical and Environmental Security
- 8. Disaster Recovery and Business Continuity Management
- 9. Other Technical Aspects
- Appendix A
- Activity solution pointers
- Sample question answers
- Glossary
- Index
- Back Cover