Building an effective information security policy architecture / Sandy Bacik.
نوع المادة : نصالناشر:Boca Raton : CRC Press, [2008]تاريخ حقوق النشر: copyright 2008وصف:xiv, 344 pages : illustrations ; 25 cmنوع المحتوى:- text
- unmediated
- volume
- 9781420059052 (hbk)
- QA76.9.A25 B335 2008
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 B335 2008 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011313775 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 B335 2008 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011313776 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 A8246 2009 Security software development : assessing and managing security risks / | QA76.9.A25 B33 1995 The computer privacy handbook / | QA76.9.A25 B335 2008 Building an effective information security policy architecture / | QA76.9.A25 B335 2008 Building an effective information security policy architecture / | QA76.9.A25. B336 2006 الأمن و حرب المعلومات / | QA76.9.A25. B336 2006 الأمن و حرب المعلومات / | QA76.9 A25 B35 2002 الامن وحرب المعلومات |
"An Auerbach book."
Includes bibliographical references and index.
1. Introduction --- 2. The Enterprise --- 3. What Is a Policy Architecture? --- 4. Getting Ready to Start --- 5. Writing the Documents --- 6. Additional Key Policy Topics --- 7. Putting It Together --- 8. Crafting Communication for Maximum Effectiveness --- 9. Security Monitoring and Metrics --- 10. Continuing to Mold Your Style Through Experience.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. -- Back cover.