Imagen de Google Jackets
Vista normal Vista MARC

Building a practical information security program / Jason Andress, CISSP, ISSAP, CISM, GPEN, Mark Leary, CISSP, CISM, CGIET, PMP.

Por: Colaborador(es): Tipo de material: TextoTextoEditor: Cambridge, MA : Syngress, is an imprint of Elsevier, 2017Fecha de copyright: ©2017Descripción: xi, 191 páginas : ilustraciones ; 24 cmTipo de contenido:
  • texto
Tipo de medio:
  • sin mediación
Tipo de soporte:
  • volumen
ISBN:
  • 9780128020425
  • 0128020423
Tema(s): Clasificación LoC:
  • HF 5548.37 A537.2017
Contenidos:
Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.
Resumen: Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura topográfica Copia número Estado Fecha de vencimiento Código de barras
Libros Biblioteca Francisco Xavier Clavigero Acervo Acervo General HF 5548.37 A537.2017 (Navegar estantería(Abre debajo)) ej. 1 Disponible UIA202071

Incluye referencias bibliográficas e índice.

Planes Manresa

Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.

Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.