Libros importados hasta 50% OFF + Envío Gratis a todo USA   Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Information Security Policies and Procedures: A Practitioner's Reference, Second Edition: Guidelines for Effective Information Security Management (in English)
Type
Physical Book
Year
2004
Language
English
Pages
384
Format
Hardcover
Weight
1.55
ISBN13
9780849319587
Edition No.
2
Categories

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition: Guidelines for Effective Information Security Management (in English)

Thomas R. Peltier (Author) · Auerbach Publications · Hardcover

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition: Guidelines for Effective Information Security Management (in English) - Thomas R. Peltier

Physical Book

$ 142.11

$ 150.00

You save: $ 7.89

5% discount
  • Condition: New
It will be shipped from our warehouse between Thursday, July 11 and Friday, July 12.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Information Security Policies and Procedures: A Practitioner's Reference, Second Edition: Guidelines for Effective Information Security Management (in English)"

Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures. It may be tempting to download some organization’s policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Hardcover.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews