571 products were found matching your search for Information Security in 1 shops:
-
Information Security: Contemporary Cases: Contemporary Cases
Vendor: Abebooks.com Price: 48.99 $Information Security: Contemporary Cases addresses fundamental information security concepts in realistic scenarios. Through a series of substantive cases, different aspects of information security are addressed by real organizations. The organizations include Kraft Foods, Advo, IBM, SRA, Aetna, the FBI, and the Yale New Haven Center for Emergency Preparedness and Disaster Response. Case topics include data protection, integrating IT and physical security, contingency planning, disaster recovery, network security, hardware design, encryption, standards compliance, tracking intruders, and training and awareness programs. This casebook will enable students to develop the practical understanding needed for today's information security and information assurance profession.
-
Information Security Governance
Vendor: Abebooks.com Price: 81.72 $This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.
-
Information Security: Principles and Practice, 3rd Edition
Vendor: Abebooks.com Price: 59.56 $Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported
-
Information Security in Healthcare: Managing Risk (HIMSS Book Series)
Vendor: Abebooks.com Price: 37.11 $Information Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the modern healthcare environment. Combining the experience and insights of top healthcare IT managers and information security professionals, this book offers detailed coverage of myriad
-
Information Security Planning : A Practical Approach
Vendor: Abebooks.com Price: 56.14 $Unread book in perfect condition.
-
Information Security Governance: A Practical Development and Implementation Approach
Vendor: Abebooks.com Price: 71.86 $The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival. Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers: The business case for information security Defining roles and responsibilities Developing strategic metrics Determining information security outcomes Setting security governance objectives Establishing risk management objectives Developing a cost-effective security strategy A sample strategy development The steps for implementing an effective strategy Developing meaningful security program development metrics Designing relevant information security management metrics Defining incident management and response metrics Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.
-
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data [first edition]
Vendor: Abebooks.com Price: 41.97 $Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.Written by security practitioners, for security practitionersReal-world case studies and scenarios are provided for each analytics techniqueLearn about open-source analytics and statistical packages, tools, and applicationsStep-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios providedLearn how to design and utilize simulations for "what-if" scenarios to simulate security events and processesLearn how to utilize big data techniques to assist in incident response and intrusion analysis
-
Information Security Management Principles
Vendor: Abebooks.com Price: 56.74 $In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.
-
Information Security: The Complete Reference, Second Edition
Vendor: Abebooks.com Price: 52.03 $Buy with confidence! Book is in new, never-used condition 3.24
-
Information Security Management Handbook, Volume 7 (Hardcover)
Vendor: Abebooks.com Price: 152.93 $Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2® CISSP® CBK® Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.
-
Information Security Policies Made Easy, Version 10
Vendor: Abebooks.com Price: 791.01 $Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
-
Information Security: Principles and Practices
Vendor: Abebooks.com Price: 12.65 $For an introductory course in information security covering principles and practices. This text covers the ten domains in the Information Security Common Body of Knowledge, which are Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.
-
Information Security Policies, Procedures, and Standards
Vendor: Abebooks.com Price: 81.44 $By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.
-
Information Security Handbook
Vendor: Abebooks.com Price: 28.15 $Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported
-
Information Security and Employee Behaviour
Vendor: Abebooks.com Price: 46.48 $Acceptable/Fair condition. Book is worn, but the pages are complete, and the text is legible. Has wear to binding and pages, may be ex-library. 0.68
-
Information Security Governance: A Practical Development and Implementation Approach
Vendor: Abebooks.com Price: 50.25 $The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival. Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers: The business case for information security Defining roles and responsibilities Developing strategic metrics Determining information security outcomes Setting security governance objectives Establishing risk management objectives Developing a cost-effective security strategy A sample strategy development The steps for implementing an effective strategy Developing meaningful security program development metrics Designing relevant information security management metrics Defining incident management and response metrics Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.
-
Information Security Management Principles: Third edition
Vendor: Abebooks.com Price: 36.21 $In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.
-
Information Security Governance Simplified
Vendor: Abebooks.com Price: 57.28 $Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn’t when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
-
Information Security: Principles and Practice
Vendor: Abebooks.com Price: 2.74 $Brand new book. This is an international edition textbook with identical content as the US version and is usually paperback bound instead of hardcover. We ship all our orders from CA/IL, USA (depending on your address) and NOT from Asia! Buy with confidence from a 5-star US based seller. Choose expedited shipping for superfast delivery with tracking.
-
Information Security Illuminated
Vendor: Abebooks.com Price: 63.47 $A comprehensive survey of the most current and critical information security practices, Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language and reinforced by a large number of scenario-based exercises and practical review questions. Readers are then able to apply their knowledge through hands-on experience with computer security-related tools. Coverage begins with the basics of computer security (CIA and DAD triads, risk analysis, etc.), and moves quickly through to important, real-world topics such as access control methodologies, security principles and practices, business continuity planning and disaster recovery, firewalls, incident handling, and much more. In addition to providing the requisite material for a complete course in information security practices, the book can be used as a self-study guide for many of the basic security certifications.
571 results in 0.239 seconds
Related search terms
© Copyright 2025 shopping.eu