Complete Guide to CISM Certification
Autor Thomas R. Peltier, Justin Peltieren Limba Engleză Hardback – 13 dec 2006
Complete Guide to CISM® Certification describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.
Preț: 753.55 lei
Preț vechi: 941.94 lei
-20% Nou
Puncte Express: 1130
Preț estimativ în valută:
144.26€ • 150.52$ • 120.93£
144.26€ • 150.52$ • 120.93£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849353567
ISBN-10: 0849353564
Pagini: 474
Ilustrații: 99 black & white illustrations, 62 black & white tables
Dimensiuni: 156 x 234 x 30 mm
Greutate: 1.04 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849353564
Pagini: 474
Ilustrații: 99 black & white illustrations, 62 black & white tables
Dimensiuni: 156 x 234 x 30 mm
Greutate: 1.04 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
ProfessionalCuprins
Information Security Governance. Information Security Risk Management. Information Security Program Management. Information Security Management. Response Management.
Recenzii
“Developed by Information Systems Audit and Controls Association, The Certified Information Security Manager certification program is aimed towards information security managers with five or more years of prior experience in enterprise information security management. … have structured their book along the same lines a s the certification class, presenting advanced information on information security governance, information security risk management, information security program management, information security management, and response management. …”
— In Book News Inc., June 2007
— In Book News Inc., June 2007
Notă biografică
Thomas R. Peltier, Justin Peltier
Descriere
Structured along the same lines as the certification class, this volume describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. It examines five functional areas: security governance, risk management, information security program management, information security management, and response management. Presenting definitions of roles and responsibilities throughout the organization, this practical guide deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary to effectively manage information security, and provides a description of various techniques the information security manager can use.