Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Information Security Policies, Procedures, and Standards, Landoll, Douglas J.


Варианты приобретения
Цена: 19906.00р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Landoll, Douglas J.
Название:  Information Security Policies, Procedures, and Standards
ISBN: 9781482245899
Издательство: Taylor&Francis
Классификация:


ISBN-10: 1482245892
Обложка/Формат: Hardback
Страницы: 254
Вес: 0.49 кг.
Дата издания: 05.05.2016
Язык: English
Иллюстрации: 23 tables, black and white; 14 illustrations, black and white
Размер: 164 x 240 x 19
Читательская аудитория: General (us: trade)
Подзаголовок: A practitioner`s reference
Рейтинг:
Поставляется из: Европейский союз


Information security policies, procedures, and standards

Автор: Landoll, Douglas J.
Название: Information security policies, procedures, and standards
ISBN: 036766996X ISBN-13(EAN): 9780367669966
Издательство: Taylor&Francis
Рейтинг:
Цена: 5051.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures

Enterprise level security 2

Автор: Foltz, Kevin E. Simpson, William R.
Название: Enterprise level security 2
ISBN: 0367531739 ISBN-13(EAN): 9780367531737
Издательство: Taylor&Francis
Рейтинг:
Цена: 12095.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors` first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions.

Information security governance

Автор: Volchkov, Andrej
Название: Information security governance
ISBN: 0815356447 ISBN-13(EAN): 9780815356448
Издательство: Taylor&Francis
Рейтинг:
Цена: 9033.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 18586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

The Complete Guide to Cybersecurity Risks and Controls

Автор: Kohnke
Название: The Complete Guide to Cybersecurity Risks and Controls
ISBN: 1498740545 ISBN-13(EAN): 9781498740548
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations.

The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats.

The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.

Information Technology Control & Au

Автор: Otero
Название: Information Technology Control & Au
ISBN: 1498752284 ISBN-13(EAN): 9781498752282
Издательство: Taylor&Francis
Рейтинг:
Цена: 11329.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The new fifth edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. It is aligned with and suppoing COBIT, filled with exercises, review questions, section summaries, and references for further reading.

Data asset valuation

Автор: Ray, Dewey E.
Название: Data asset valuation
ISBN: 1138297747 ISBN-13(EAN): 9781138297746
Издательство: Taylor&Francis
Рейтинг:
Цена: 12554.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Data has value, but our accounting methods do not give data a monetary value. This book presents a straight-forward, well-researched, practical solution to this problem by defining exactly what "data" is, explaining the role of data management in data asset valuations, and presenting an "open framework" - along with methods - for valuing data.

Implementing Cybersecurity

Автор: Kohnke
Название: Implementing Cybersecurity
ISBN: 149878514X ISBN-13(EAN): 9781498785143
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Cognitive Hack

Автор: Bone
Название: Cognitive Hack
ISBN: 149874981X ISBN-13(EAN): 9781498749817
Издательство: Taylor&Francis
Рейтинг:
Цена: 12554.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

The Insider Threat

Автор: Thompson
Название: The Insider Threat
ISBN: 1498747086 ISBN-13(EAN): 9781498747080
Издательство: Taylor&Francis
Рейтинг:
Цена: 10411.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. The book guides readers to a greater depth of understanding and action-oriented options.

Securing an IT Organization through Governance, Risk Management, and Audit

Автор: Sigler
Название: Securing an IT Organization through Governance, Risk Management, and Audit
ISBN: 1498737315 ISBN-13(EAN): 9781498737319
Издательство: Taylor&Francis
Рейтинг:
Цена: 11023.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.

Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.

The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.

Information Security

Автор: Layton
Название: Information Security
ISBN: 0849370876 ISBN-13(EAN): 9780849370878
Издательство: Taylor&Francis
Рейтинг:
Цена: 19140.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents a perspective of the ISO/IEC 17799 Information Security Standard and provides an analysis of how to effectively measure an information security program using this standard. This book includes a qualitative-based risk assessment methodology.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия