Practical information security management: a complete guide to planning and implementation
Material type:
- 978-1-4842-1685-9
- QA/76.9.A25/C3637/2016
Contents:
Contiene: 1. Evolution of a profession.- 2. Threats and vulnerabilities.- 3. The information security manager.- 4. Organizational security.- 5. Information security implementation.- 6. Standards, frameworks, guidelines, and legislation.- 7. Protection of information.- 8. Protection of people.- 9. Protection of premises.- 10. Protection of systems.- 11. Digital evidence and incident response.- 12. Cloud computing security.- 13. Industrial control systems.- 14. Secure systems development.
No physical items for this record
Contiene: 1. Evolution of a profession.- 2. Threats and vulnerabilities.- 3. The information security manager.- 4. Organizational security.- 5. Information security implementation.- 6. Standards, frameworks, guidelines, and legislation.- 7. Protection of information.- 8. Protection of people.- 9. Protection of premises.- 10. Protection of systems.- 11. Digital evidence and incident response.- 12. Cloud computing security.- 13. Industrial control systems.- 14. Secure systems development.
There are no comments on this title.
Log in to your account to post a comment.