By Bel G. Raggad
Information defense can't be successfully controlled until safe tools and criteria are built-in into all levels of the knowledge safeguard lifestyles cycle. And, even supposing the overseas group has been aggressively engaged in constructing protection criteria for community and data protection all over the world, there are few textbooks on hand that supply transparent assistance on how you can correctly practice the recent criteria in carrying out protection audits and growing risk-driven info safety courses.
An authoritative and functional lecture room source, Information safety administration: thoughts and Practice offers a basic assessment of safeguard auditing earlier than interpreting a few of the components of the data defense lifestyles cycle. It explains the ISO 17799 normal and walks readers during the steps of carrying out a nominal safeguard audit that conforms to the normal. The textual content additionally offers distinct tips for carrying out an in-depth technical safety audit resulting in certification opposed to the 27001 typical. subject matters addressed comprise cyber protection, safeguard hazard tests, privateness rights, HIPAA, SOX, intrusion detection platforms, safety checking out actions, cyber terrorism, and vulnerability tests.
This self-contained textual content is stuffed with overview questions, workshops, and real-world examples that illustrate powerful implementation and protection auditing methodologies. it's also a close safety auditing technique scholars can use to plot and enforce potent risk-driven safeguard courses that contact all stages of a computing environment―including the sequential levels had to hold nearly air-tight IS administration structures that agree to the newest ISO criteria.
Read or Download Information Security Management: Concepts and Practice PDF
Best Comptia books
Crucial talents for IT professionalsMike Meyers A+ advisor to notebook Lab guide, moment variation beneficial properties 40-plus lab routines that problem you to resolve difficulties in response to practical case reports and step by step situations that require serious considering. you are going to additionally get post-lab commentary questions that degree your realizing of lab effects and key time period quizzes that support construct vocabulary.
A textbook for novices in safety. during this new first variation, famous writer Behrouz Forouzan makes use of his obtainable writing variety and visible method of simplify the tricky options of cryptography and community defense. This version additionally offers an internet site that comes with Powerpoint records in addition to teacher and scholars strategies manuals.
Linux Routers, moment version indicates you precisely the right way to lessen your expenses and expand your community with Linux-based routing. you will discover step by step insurance of software/hardware choice, configuration, administration, and troubleshooting for present day key internetworking functions, together with LANs, Internet/intranet/extranet routers, body Relay, VPNs, distant entry, and firewalls.
WebDAV: Next-Generation Collaborative internet Authoring is the full advisor to Web-based dispensed Authoring and Versioning (WebDAV), the IETF usual for net authoring and vast zone collaboration. skilled implementer Lisa Dusseault covers WebDAV from bits at the twine as much as customized software implementation, demonstrating with huge examples and lines from genuine consumers and servers.
Extra resources for Information Security Management: Concepts and Practice