The CISO Handbook: A Practical Guide to Securing Your Company
Autor Michael Gentile, Ron Collette, Thomas D. Augusten Limba Engleză Hardback – 24 aug 2005
Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.
Preț: 782.41 lei
Preț vechi: 1143.56 lei
-32% Nou
Puncte Express: 1174
Preț estimativ în valută:
149.75€ • 156.08$ • 124.66£
149.75€ • 156.08$ • 124.66£
Carte tipărită la comandă
Livrare economică 06-20 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849319525
ISBN-10: 0849319528
Pagini: 346
Ilustrații: 49 b/w images and 15 tables
Dimensiuni: 156 x 234 x 24 mm
Greutate: 0.7 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849319528
Pagini: 346
Ilustrații: 49 b/w images and 15 tables
Dimensiuni: 156 x 234 x 24 mm
Greutate: 0.7 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
ProfessionalCuprins
Assess. Plan. Design. Execute. Report. The final phase.
Notă biografică
Mike Gentile is on a mission to change the status quo in Information Security as we know it. His goal is to translate the discipline from one that is often misunderstood, inefficiently applied, and painful to one that is seamless, collaborative, and repeatable in organizations across the globe. Delphiis is the encapsulation of this mission. Mike brings balance of business acumen and technical skill-set anchored by years in the field and his core focus over the past 15 years has been his practice, Coastline Consulting services. As the Founder and President, Coastline has developed enterprise security programs for countless leading public, private, and government organizations, including many within the Global 1000 and Fortune 500. During that time he also became Co-Founder and Editor for CISOHandbook.com, the leading portal for security leaders.As a researcher, Mike has contributed numerous publications within the Information technology, project management, and security communities. He is also a senior researcher with Computer Economics in the Information Security domain and has written articles for the ISSA Journal, Computer Economics, RSA Conference and Secure World Expo.
As a writer he is the co-author of The CISO Handbook: A Practical Guide to Securing Your Company as well as CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives. The CISO Handbook is used as course material for numerous advanced education and Master’s programs on security leadership around the world. Mr. Gentile serves on multiple advisory boards, including being on the Board of Advisors for Savant, a malware protection company, as well an active member of the RSA Program Committee since 2009.
Mr. Gentile is a sought after speaker on security, project management, and information technology topics. For the last 3 years he has been a top rated speaker at RSA, the most prestigious security conference in the United states and has been keynote speaker for the CXO Summits conference series. He has also presented over the years for the Project Management Institute, Secure World Expo, ISSA, Symantec, and many more.Mike lives in Southern California with his wife Tiffany and their two boys.
Mr. Gentile is a sought after speaker on security, project management, and information technology topics. For the last 3 years he has been a top rated speaker at RSA, the most prestigious security conference in the United states and has been keynote speaker for the CXO Summits conference series. He has also presented over the years for the Project Management Institute, Secure World Expo, ISSA, Symantec, and many more.Mike lives in Southern California with his wife Tiffany and their two boys.
Descriere
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios. It builds a bridge between high-level theory and practical execution by illustrating solutions to practical issues often overlooked by theoretical texts. This leads to a set of practices that security professionals can use every day. The framework it describes can be expanded or contracted to meet the needs of almost any organization. A reference as well as a guide, each of the chapters are self-contained and can be read in any order.