Home > Computer Science > Computer Security/Cryptography > INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT: CONCEPTS AND PRACTICE, 1/e

INFORMATION SECURITY MANAGEMENT: CONCEPTS AND PRACTICE, 1/e

Taylor & Francis
  • 9781420078541
  • 868 pages
  • Paperback
  • 6" x 9" inches
  • Book 1,495.00
  • 2015


 

This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment—including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

Printer post review Bookmark and Share
    Part-I: Introduction
  • Introduction to Information Security Management
  • Introduction to Management Concepts
  • The Information Security Life Cycle, Part-II: Security Plan
  • Security Plan
  • Security Policy
  • Business Continuity Planning, Part-III: Security Analysis
  • Security Risk Management
  • Continual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR)
  • Active Security Assessment
  • System Availability, Part-IV: Security Design
  • Nominal Security Enhancement Design Based on ISO/IEC 27002
  • Technical Security Enhancement Based on ISO/IEC 27001, Part-V: Security Implementation
  • Security Solutions
  • The Common Criteria, Part-VI: Security Review
  • Security Review through Security Audit
  • Privacy Rights, Information Technology, and HIPAA, Part-VII: Continual Security
  • The Sarbanes–Oxley Act and IT Compliance
  • Cyberterrorism and Homeland Security