Information Security Fundamentals, Second Edition by Thomas R. Peltier

By Thomas R. Peltier

Developing a data safety application that clings to the primary of defense as a company enabler needs to be step one in an enterprise’s attempt to construct an efficient safety software. Following within the footsteps of its bestselling predecessor, Information defense basics, moment version provides information protection execs with a transparent realizing of the basics of safety required to handle the variety of matters they are going to adventure within the field.

The booklet examines the weather of laptop protection, worker roles and tasks, and customary threats. It discusses the felony necessities that influence defense rules, together with Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing actual safety requisites and controls, this up to date version deals a pattern actual safeguard coverage and features a whole record of initiatives and targets that make up a good info safeguard program.

  • Includes ten new chapters

  • Broadens its insurance of rules to incorporate FISMA, PCI compliance, and international requirements

  • Expands its insurance of compliance and governance issues

  • Adds discussions of ISO 27001, ITIL, COSO, COBIT, and different frameworks

  • Presents new info on cellular safeguard issues

  • Reorganizes the contents round ISO 27002

The e-book discusses organization-wide guidelines, their documentation, and criminal and company specifications. It explains coverage layout with a spotlight on international, topic-specific, and application-specific rules. Following a evaluate of asset category, it explores entry keep an eye on, the parts of actual protection, and the rules and methods of probability research and threat management.

The textual content concludes by means of describing enterprise continuity making plans, preventive controls, restoration ideas, and the way to behavior a enterprise effect research. every one bankruptcy within the publication has been written through a unique professional to make sure you achieve the excellent figuring out of what it takes to improve a good details safeguard program.

Show description

Read or Download Information Security Fundamentals, Second Edition PDF

Similar information technology books

Amazon SimpleDB Developer Guide

This booklet is a pragmatic real-world instructional masking every thing you want to learn about Amazon SimpleDB. you are going to encounter examples in 3 languages: Java, personal home page, and Python. This e-book is geared toward reworking you from a newbie to a complicated developer. when you are a developer eager to construct scalable web-based database functions utilizing SimpleDB, then this publication is for you.

Passing the ITIL foundation excam (Best practice Book 1)

This ebook is helping humans organize for the ITIL® 2011 variation origin qualification examination. It comprises direct hyperlinks to the entire syllabus and specifies the phrases and definitions required. The content material of this publication relies at the ITIL® 2011 version middle suggestions and APMGs ITIL origin certificates syllabus version 2011.

Microsoft Visio - En grön bok för gröngölingar: För version 2010 - 2016 (Swedish Edition)

Med den här boken kommer du snabbt igång med att skapa flödesscheman, organisationsscheman, Gantt-scheman, tidslinjer och planritningar i Visio. Du lär dig även hur du kan använda Visio som ett verktyg vid presentationer och föreläsningar. Allt detta på endast 36 sidor. Bokens utformande är kortfattat och koncist och kräver inte mer än lite grundläggande Windowskunskap av läsaren för att bokens exempel ska kunna följas.

Project Portfolio Management in Theory and Practice: Thirty Case Studies from around the World (Best Practices and Advances in Program Management)

Each CEO on this planet, if wondered, will continuously whinge that there are lots of principles to enforce, yet, regrettably, inadequate assets to complete them. This publication presents an answer to this predicament by means of providing recommendations to evaluate the price of tasks, prioritize tasks, and choose which tasks to enforce and which to delay.

Additional resources for Information Security Fundamentals, Second Edition

Sample text

Download PDF sample

Rated 4.94 of 5 – based on 15 votes