Information security policies, procedures, and standards : a practitioner's reference / Douglas J. Landoll.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781482245899
- 1482245892
- HF5548.37 .L3577 2016
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HF5548.37 .L3577 2016 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000037398 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HF5548.37 .L3577 2016 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30020000052810 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
HF5548.37 .K64 2018 Understanding cyber risk : protecting your corporate assets / | HF5548.37 .K64 2018 Understanding cyber risk : protecting your corporate assets / | HF5548.37 .L3577 2016 Information security policies, procedures, and standards : a practitioner's reference / | HF5548.37 .L3577 2016 Information security policies, procedures, and standards : a practitioner's reference / | HF5548.37 S34 2011 Practical risk management for the CIO / | HF5548.37 S34 2011 Practical risk management for the CIO / | HF5548.37 .W55 2007 Principles of incident response and disaster recovery / |
Includes bibliographical references and index.
Chapter 1. Introduction -- chapter 2. Information security policy basics -- chapter 3. Information security policy framework -- chapter 4. Information security policy details -- chapter 5. Information security procedures and standards -- chapter 6. Information security policy projects.
"Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards."--Provided by Publisher.