libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

landoll douglas j. - information security policies, procedures, and standards
Zoom

Information Security Policies, Procedures, and Standards A Practitioner's Reference




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
156,98 €
NICEPRICE
149,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 05/2016
Edizione: 1° edizione





Note Editore

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.




Sommario

IntroductionNo Short CutsTop-Down SecurityCurrent State of Information Security Policy SetsEffectiveness of Information Security Policy SetsExercisesInformation Security Policy BasicsInformation Security Policy TypesExercisesInformation Security Policy FrameworkInformation Security Policy Sets without FrameworksInformation Security Policy Sets with FrameworksCommon Information SPFsTailoring Information SPFsDeriving a Policy Set from a FrameworkExercisesInformation Security Policy DetailsFront MatterPolicy StatementsSpecific Information Security PoliciesPolicy Document ExamplesExercisesInformation Security Procedures and StandardsLess Formal Language and StructureVarious Purposes of the Standard and GuidelineInformation Security ProceduresExercisesInformation Security Policy ProjectsScoping the ProjectInformation Security Policy Project RolesInformation Security Policy Project PhasesInformation Security Policy Revision ProjectInformation Security Policy Project ApplicationExercisesAppendicesExample Policies (FISMA Framework)Example Departmental PolicyTailoring Guide




Autore

Doug Landoll is an information security author, consultant, teacher, and business owner who always brings a unique mix of business strategy, technical know-how, and pragmatic approaches to current information security topics. When he is not performing risk assessments or writing policies, he is coming up with better approaches and methods and preparing for his next class or book. Mr. Landoll holds a CISSP, a computer science degree from James Madison University, and an MBA from the University of Texas, Austin. In 2013, Mr. Landoll was inducted as a Distinguished Fellow by the Information Systems Security Association (ISSA).










Altre Informazioni

ISBN:

9781482245899

Condizione: Nuovo
Dimensioni: 9.25 x 6.25 in Ø 1.19 lb
Formato: Copertina rigida
Illustration Notes:14 b/w images and 23 tables
Pagine Arabe: 240
Pagine Romane: xiv


Dicono di noi