Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. This title provides an overview of security auditing and examines the various elements of the information security life cycle.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. This title provides an overview of security auditing and examines the various elements of the information security life cycle.
INTRODUCTION. Introduction to Information Security Management. Introduction to Management Concepts. The Information Security Life Cycle. SECURITY PLAN. Security Plan. Security Policy. Business Continuity Planning. SECURITY ANALYSIS. Security Risk Management. Continual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR). Active Security Assessment. System Availability. SECURITY DESIGN. Nominal Security Enhancement Design Based on ISO/IEC 27002. Technical Security Enhancement Based on ISO/IEC 27001. SECURITY IMPLEMENTATION. Security Solutions. The Common Criteria. SECURITY REVIEW. Security Review through Security Audit. Privacy Rights, Information Technology, and HIPAA. CONTINUAL SECURITY. The Sarbanes-Oxley Act and IT Compliance. Cyberterrorism and Homeland Security. INDEX.
INTRODUCTION. Introduction to Information Security Management. Introduction to Management Concepts. The Information Security Life Cycle. SECURITY PLAN. Security Plan. Security Policy. Business Continuity Planning. SECURITY ANALYSIS. Security Risk Management. Continual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR). Active Security Assessment. System Availability. SECURITY DESIGN. Nominal Security Enhancement Design Based on ISO/IEC 27002. Technical Security Enhancement Based on ISO/IEC 27001. SECURITY IMPLEMENTATION. Security Solutions. The Common Criteria. SECURITY REVIEW. Security Review through Security Audit. Privacy Rights, Information Technology, and HIPAA. CONTINUAL SECURITY. The Sarbanes-Oxley Act and IT Compliance. Cyberterrorism and Homeland Security. INDEX.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309