Extent: | Online-Ressource (617 p) |
---|---|
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Description based upon print version of record Cover Page; Title Page; Copyright Page; Dedication; Contents; Foreword; Acknowledgments; Introduction; About The Author; Chapter 1: Getting Information Security Right: Top to Bottom; Chapter 2: Developing Information Security Strategy; Chapter 3: Defining the Security Management Organization; Chapter 4: Interacting with the C-Suite; Chapter 5: Managing Risk to an Acceptable Level; Chapter 6: Creating Effective Information Security Policies; Chapter 7: Security Compliance Using Control Frameworks; Chapter 8: Managerial Controls: Practical Security Considerations Chapter 9: Technical Controls: Practical Security ConsiderationsChapter 10: Operational Controls: Practical Security Considerations; Chapter 11: The Auditors Have Arrived, Now What?; Chapter 12: Effective Security Communications; Chapter 13: The Law and Information Security; Chapter 14: Learning From Information Security Incidents; Chapter 15: 17 Ways To Dismantle Information Security Governance Efforts; Index; |
ISBN: | 978-1-4398-1163-4 ; 978-1-4398-1165-8 ; 978-1-4398-1165-8 ; 978-1-4398-1163-4 |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10012683161