Information Security Policies and Procedures: A Practitioner's Reference, Second Edition
Autor Thomas R. Peltieren Limba Engleză Hardback – 11 iun 2004
It may be tempting to download some organization’s policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.
Preț: 873.08 lei
Preț vechi: 1091.34 lei
-20% Nou
Puncte Express: 1310
Preț estimativ în valută:
167.11€ • 175.31$ • 138.62£
167.11€ • 175.31$ • 138.62£
Carte tipărită la comandă
Livrare economică 29 ianuarie-12 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849319587
ISBN-10: 0849319587
Pagini: 408
Ilustrații: 22 b/w images and 53 tables
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.91 kg
Ediția:Revizuită
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849319587
Pagini: 408
Ilustrații: 22 b/w images and 53 tables
Dimensiuni: 156 x 234 x 27 mm
Greutate: 0.91 kg
Ediția:Revizuită
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic, Professional, and Professional Practice & DevelopmentCuprins
INFORMATION SECURITY POLICIES AND PROCEDURES. Introduction. Why manage this process as a project? Planning and preparation. Developing policies. Asset classification policy. Developing standards. Developing procedures. Creating a table of contents. Understanding how to sell policies, standards, and procedures. Appendix 1A Typical tier 1 policies. Appendix 1B Typical tier 2 policies. Appendix 1C Sample standards manual. Appendix 1D Sample information security manual. INFORMATION SECURITY REFERENCE GUIDE. Introduction to information security. Fundamentals of information security. Employee responsibilities. Information classification. Information handling. Tools of information security. Information processing. Information security program administration. Baseline organization information security program. Appendix 2A.
Recenzii
“The path to information security is a long one, but in this book author Thomas Peltier makes the scenery attractive along the way. Peltier walks the reader through [the text] with clarity, completeness, and humor. ”
— Security Management, June 2005
— Security Management, June 2005
Descriere
This book illustrates how policies and procedures support the efficient running of an organization. It points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements. The authors emphasize how information security must be integrated into all business processes. The book examines Tier 1, Tier 2, and Tier 3 policies.