0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Not currently available

Information Security Management - Concepts and Practice (Electronic book text)
Information Security Management - Concepts and Practice (Electronic book text): Bel G. Raggad
Information Security Management - Concepts and Practice (Electronic book text): Bel G. Raggad

Share your images

Information Security Management - Concepts and Practice (Electronic book text)

Bel G. Raggad

 (sign in to rate)

Bookmark and Share

We have no sources for this product at present. If you add this to your wishlist we will let you know should it become available to order.

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs. An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments. This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment-including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

General

Imprint: Crc Press
Country of origin: United States
First published: 2010
Authors: Bel G. Raggad
Format: Electronic book text
Pages: 871
ISBN-13: 978-1-4665-3078-2
Barcode: 9781466530782
Categories: Promotions
Books > Business & Economics > Business & management > Management of specific areas
Books > Business & Economics > Business & management > Management of specific areas > General
Books > Computing & IT > Computer communications & networking > Network security
LSN: 1-4665-3078-2

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Loyalty partners