Information Security Policies, Procedures, and Standards, Landoll, Douglas J.
Автор: Landoll, Douglas J. Название: Information security policies, procedures, and standards ISBN: 036766996X ISBN-13(EAN): 9780367669966 Издательство: Taylor&Francis Рейтинг: Цена: 5051.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book supplies a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures
Автор: Foltz, Kevin E. Simpson, William R. Название: Enterprise level security 2 ISBN: 0367531739 ISBN-13(EAN): 9780367531737 Издательство: Taylor&Francis Рейтинг: Цена: 12095.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors` first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions.
Автор: Volchkov, Andrej Название: Information security governance ISBN: 0815356447 ISBN-13(EAN): 9780815356448 Издательство: Taylor&Francis Рейтинг: Цена: 9033.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.
Автор: Dengguo Feng Название: Trusted Computing: Principles and Applications ISBN: 3110476045 ISBN-13(EAN): 9783110476040 Издательство: Walter de Gruyter Рейтинг: Цена: 18586.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Автор: Kohnke Название: The Complete Guide to Cybersecurity Risks and Controls ISBN: 1498740545 ISBN-13(EAN): 9781498740548 Издательство: Taylor&Francis Рейтинг: Цена: 18374.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations.
The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats.
The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.
Автор: Otero Название: Information Technology Control & Au ISBN: 1498752284 ISBN-13(EAN): 9781498752282 Издательство: Taylor&Francis Рейтинг: Цена: 11329.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The new fifth edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. It is aligned with and suppoing COBIT, filled with exercises, review questions, section summaries, and references for further reading.
Автор: Ray, Dewey E. Название: Data asset valuation ISBN: 1138297747 ISBN-13(EAN): 9781138297746 Издательство: Taylor&Francis Рейтинг: Цена: 12554.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Data has value, but our accounting methods do not give data a monetary value. This book presents a straight-forward, well-researched, practical solution to this problem by defining exactly what "data" is, explaining the role of data management in data asset valuations, and presenting an "open framework" - along with methods - for valuing data.
Автор: Kohnke Название: Implementing Cybersecurity ISBN: 149878514X ISBN-13(EAN): 9781498785143 Издательство: Taylor&Francis Рейтинг: Цена: 18374.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.
Автор: Bone Название: Cognitive Hack ISBN: 149874981X ISBN-13(EAN): 9781498749817 Издательство: Taylor&Francis Рейтинг: Цена: 12554.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.
Автор: Thompson Название: The Insider Threat ISBN: 1498747086 ISBN-13(EAN): 9781498747080 Издательство: Taylor&Francis Рейтинг: Цена: 10411.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. The book guides readers to a greater depth of understanding and action-oriented options.
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.
Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.
The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.
Автор: Layton Название: Information Security ISBN: 0849370876 ISBN-13(EAN): 9780849370878 Издательство: Taylor&Francis Рейтинг: Цена: 19140.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presents a perspective of the ISO/IEC 17799 Information Security Standard and provides an analysis of how to effectively measure an information security program using this standard. This book includes a qualitative-based risk assessment methodology.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru