Theory Lab Access. Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. Labs: Lab 1: Creating an Acceptable Use Policy Lab 2: Developing a Security Policy Framework Implementation Plan Lab 3: Defining a Security Policy Framework Lab 4: Creating a Separation of Duties Policy Lab 5: Creating a Security Awareness Policy Lab 6: Creating a Remote Access Policy Lab 7: Creating a Business Continuity Plan Policy Lab 8: Creating an Incident Response Policy Lab 9: Implementing an Information Security Policy Lab 10: Enabling Audit Trails to Monitor Policy Compliance
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Robert Johnson (CISA, CGEIT, CISM, CISSP) has 20 years experience dealing with all aspects of information security, IT audit, risk management, and privacy compliance. His diverse background includes hands-on operational experience as well as providing strategic risk assessment and scoring for leadership and board-level audiences. Currently he works in the security risk management division of a large financial services insurance company. Previously he worked as a first vice president and IT audit and security advisory director at Washington Mutual (JP Morgan Chase).
CHUCK EASTTOM is an internationally renowned computer security expert and trainer. He has been in the IT industry for more than 25 years and has been training for more than 15. He routinely conducts computer security and forensics training for civilian companies, law enforcement, government agencies, and friendly foreign governments. He holds more than 40 industry certifications, including several forensics certifications such as: Certified Cyber Forensics Professional (CCFP), Certified Hacking Forensic Investigator (CHFI), Certified Criminal Investigator (CCI), Access Certified Examiner (ACE), Oxygen Certified Examiner, Certified Forensic Consultant (CFC), and others. Chuck created the OSForensics certification course and test.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 77,41 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : KRES's Textbooks Retail, Bolingbrook, IL, Etats-Unis
Paperback. Etat : New. Third Edition. BRAND NEW! Books are accepted for return within 30 days. Allow 5 - 14 business days for Standard Shipping. To Alaska, Hawaii, California, U.S. protectorate, P.O. box, and APO/FPO addresses "No Expedited Shipping" allow 4-28 business days. We do not currently ship internationally. N° de réf. du vendeur AB-842RY00003
Quantité disponible : 2 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Hardcover. Etat : Brand New. 3rd edition. 9.13x7.48x0.94 inches. In Stock. N° de réf. du vendeur 1284200000
Quantité disponible : 1 disponible(s)