Information Security Architecture
An Integrated Approach to Security in the Organization, Second Edition
Seiten
2006
|
2nd edition
Auerbach (Verlag)
978-0-8493-1549-7 (ISBN)
Auerbach (Verlag)
978-0-8493-1549-7 (ISBN)
Exploring the evolution of IS, this book incorporates the knowledge that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It discusses three additional components: monitoring and detection; computer incident/emergency response; and, disaster recovery/business continuity planning.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization.
The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization.
The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.
Jan Killmeyer
Information Security Architecture. Security Organization/Infrastructure. Security Policies, Standards, and Procedures. Security Baselines and Risk Asessments. Security Awareness and Training Program. Compliance. Pitfalls to an Effective ISA Program. Computer Incident/Emergency Response. Conclusion.
Erscheint lt. Verlag | 13.1.2006 |
---|---|
Zusatzinfo | 20 Tables, black and white; 9 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 940 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-8493-1549-2 / 0849315492 |
ISBN-13 | 978-0-8493-1549-7 / 9780849315497 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €