Creating an Information Security Program from Scratch
Autor Walter Williamsen Limba Engleză Paperback – 15 sep 2021
There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization.
While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic.
Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 385.94 lei 43-57 zile | |
CRC Press – 15 sep 2021 | 385.94 lei 43-57 zile | |
Hardback (1) | 987.84 lei 43-57 zile | |
CRC Press – 15 sep 2021 | 987.84 lei 43-57 zile |
Preț: 385.94 lei
Preț vechi: 482.42 lei
-20% Nou
Puncte Express: 579
Preț estimativ în valută:
73.86€ • 76.64$ • 61.73£
73.86€ • 76.64$ • 61.73£
Carte tipărită la comandă
Livrare economică 17-31 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367554651
ISBN-10: 0367554658
Pagini: 222
Ilustrații: 82
Dimensiuni: 156 x 234 x 12 mm
Greutate: 0.33 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
ISBN-10: 0367554658
Pagini: 222
Ilustrații: 82
Dimensiuni: 156 x 234 x 12 mm
Greutate: 0.33 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Public țintă
Academic, Professional, and Professional Practice & DevelopmentNotă biografică
Walter Williams has served as an infrastructure and security architect at firms as diverse as GTE Internetworking, State Street Corp, Teradyne, The Commerce Group and EMC. He has since moved to security leadership, where he'd served as at IdentityTruth, Passkey, Lattice Engines, and Monotype. He is an outspoken proponent of design before build, an advocate of frameworks and standards, and has spoken at Security B-Sides, Source Boston, Boston Application Security Conference, Rochester Security Summit, Wall of Sheep Village within DefCon, RiskSec Toronto and other venues . His articles on Security and Service Oriented Architecture have appeared in the Information Security Management Handbook, and he has a book with CRC press on the same topic. He sat on the board of directors for the New England ISSA chapter and was a member of the program committee for Metricons 8 and 10. He has a masters degree in Anthropology from Hunter College.
Cuprins
Preface. Chapter 1 Getting Started. Chapter 2 The Things You Must Do. Chapter 3 Asset Management. Chapter 4 Vulnerability Management. Chapter 5 Incident Management. Chapter 6 The Endpoint. Chapter 7 Email Security. Chapter 8 The Network. Chapter 9 Integrating Security Into Software Development. Chapter 10 Disasters. Chapter 11 Access Control. Chapter 12 Human Issues. Chapter 13 Maturity. Index.
Recenzii
"This is a solid, and comprehensive, guide for those who have to start securing an enterprise from square one."
- Rob Slade, Malware Researcher, Educator, Author
https://www.linkedin.com/pulse/review-creating-information-security-program-from-scratch-rob-slade/?trackingId=FfoVNajI3cwgfyKQEXhksg%3D%3D
- Rob Slade, Malware Researcher, Educator, Author
https://www.linkedin.com/pulse/review-creating-information-security-program-from-scratch-rob-slade/?trackingId=FfoVNajI3cwgfyKQEXhksg%3D%3D
Descriere
This book is written for the first security hire in an organization; either an individual moving into this role from within the organization or hired into the role.