Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Autor Jan Killmeyeren Limba Engleză Hardback – 13 ian 2006
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization.
The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.
Preț: 674.81 lei
Preț vechi: 984.81 lei
-31% Nou
Puncte Express: 1012
Preț estimativ în valută:
129.17€ • 138.88$ • 107.68£
129.17€ • 138.88$ • 107.68£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849315497
ISBN-10: 0849315492
Pagini: 424
Ilustrații: 9 b/w images and 20 tables
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.94 kg
Ediția:2Revizuită
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849315492
Pagini: 424
Ilustrații: 9 b/w images and 20 tables
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.94 kg
Ediția:2Revizuită
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic, Professional, and Professional Practice & DevelopmentCuprins
Information Security Architecture. Security Organization/Infrastructure. Security Policies, Standards, and Procedures. Security Baselines and Risk Asessments. Security Awareness and Training Program. Compliance. Pitfalls to an Effective ISA Program. Computer Incident/Emergency Response. Conclusion.
Descriere
Exploring the evolution of information security (IS), this book looks at the development of the field from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear, organized methods and guiding readers to the most effective resources available. Building on the foundation of the first edition, this volume discusses three additional components: monitoring and detection, computer incident and emergency response, and disaster recovery and business continuity planning. Each chapter provides an understanding of the component and details how it relates to the rest of the IS architecture.