0

My Bag

0.00

Download App

Information Security: Design, Implementation, Measurement, and Compliance 21.0%OFF

Information Security: Design, Implementation, Measurement, and Compliance

by Timothy P. Layton

  • ISBN

    :  

    9780849370878

  • Publisher

    :  

    Auerbach Publications

  • Subject

    :  

    Business & Management, Computer Security

  • Binding

    :  

    Hardcover

  • Pages

    :  

    222

  • Year

    :  

    2009

495.0

21.0% OFF

391.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context. Features Contains a programmatic approach that applies to a business regardless of its size or type Presents a process that allows firms to shape customized information security practices for their own requirements Demonstrates how to conduct a risk assessment covering all controls and control objectives Illustrates how to use data both qualitatively and quantitatively to meet the ISO/IEC 17799 standard Provides a gap analysis between the first and second editions of the standard to simplify transition to the new one

Related Items

-

of

  • OFFER

    Competing For The Future books

    Hamel

    Starts At

    495.0

    635.0

    22% OFF

  • OFFER

    The Jack Welch Lexicon Of Leadership

    Jeffrey Krames

    Starts At

    227.0

    250.0

    9% OFF

  • OFFER

    Making Rain: The Secrets of Building Lifelong Client Loyalty

    Andrew Sobel

    Starts At

    1143.0

    1395.0

    18% OFF

  • OFFER

    The Agenda: What Every Business Must Do to Dominate the Decade

    Michael Hammer

    Starts At

    300.0

    395.0

    24% OFF

  • OFFER

    Rich Dad's Rich Kid, Smart Kid: Giving Your Child a Financial Head Start

    Robert T. Kiyosaki

    Starts At

    446.0

    595.0

    25% OFF

  • OFFER

    Rich Dad's Cashflow Quadrant

    Robert T Kiyosaki

    Starts At

    269.0

    350.0

    23% OFF

  • Jack Straight From The Gut

    JACK WELCH

    Starts At

    499.0

  • OFFER

    FISH!

    Stephen C. Lundin

    Starts At

    105.0

    125.0

    16% OFF

  • Integrated Telecommunications Management Solutions

    Graham Chen

    Starts At

    11558.0

  • OFFER

    Development as Freedom

    Amartya Sen

    Starts At

    378.0

    450.0

    16% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary