Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. Reorganizing its contents around ISO 27002, this updated edition presents ten new chapters; adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks; expands its coverage of compliance and governance issues; and includes new information on mobile security issues.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. Reorganizing its contents around ISO 27002, this updated edition presents ten new chapters; adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks; expands its coverage of compliance and governance issues; and includes new information on mobile security issues.
Developing Policies. Organization of Information Security. Cryptology. Risk Management. Building and Maintaining an Effective Security Awareness Program. Physical Security. Disaster Recovery and Business Continuity Planning;. Continuity of Operations Planning. Access Controls. Information System Development, Acquisition, and Maintenance. Information Security Incident Management. Asset Classification. Threats to Information Security. Information Security Policies: A Practitioner's View. Glossary. Appendices: Facilitated Risk Analysis and Assessment Process. Business Impact Analysis.
Developing Policies. Organization of Information Security. Cryptology. Risk Management. Building and Maintaining an Effective Security Awareness Program. Physical Security. Disaster Recovery and Business Continuity Planning;. Continuity of Operations Planning. Access Controls. Information System Development, Acquisition, and Maintenance. Information Security Incident Management. Asset Classification. Threats to Information Security. Information Security Policies: A Practitioner's View. Glossary. Appendices: Facilitated Risk Analysis and Assessment Process. Business Impact Analysis.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309