عرض عادي

Building an effective information security policy architecture / Sandy Bacik.

بواسطة:نوع المادة : نصنصالناشر:Boca Raton : CRC Press, [2008]تاريخ حقوق النشر: copyright 2008وصف:xiv, 344 pages : illustrations ; 25 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781420059052 (hbk)
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.9.A25 B335 2008
موارد على الانترنت:
محتويات غير مكتملة:
1. Introduction --- 2. The Enterprise --- 3. What Is a Policy Architecture? --- 4. Getting Ready to Start --- 5. Writing the Documents --- 6. Additional Key Policy Topics --- 7. Putting It Together --- 8. Crafting Communication for Maximum Effectiveness --- 9. Security Monitoring and Metrics --- 10. Continuing to Mold Your Style Through Experience.
ملخص:Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. -- Back cover.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 B335 2008 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010011313775
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 B335 2008 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010011313776

"An Auerbach book."

Includes bibliographical references and index.

1. Introduction --- 2. The Enterprise --- 3. What Is a Policy Architecture? --- 4. Getting Ready to Start --- 5. Writing the Documents --- 6. Additional Key Policy Topics --- 7. Putting It Together --- 8. Crafting Communication for Maximum Effectiveness --- 9. Security Monitoring and Metrics --- 10. Continuing to Mold Your Style Through Experience.

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. -- Back cover.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة