
Download App
>> | LShop | >> | Book | >> | Economics, Finance, ... | >> | Business & Managemen... | >> | Information Security... |
ISBN
:
9780849370878
Publisher
:
Auerbach Publications
Subject
:
Business & Management, Computer Security
Binding
:
Hardcover
Pages
:
222
Year
:
2009
₹
495.0
₹
391.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context. Features Contains a programmatic approach that applies to a business regardless of its size or type Presents a process that allows firms to shape customized information security practices for their own requirements Demonstrates how to conduct a risk assessment covering all controls and control objectives Illustrates how to use data both qualitatively and quantitatively to meet the ISO/IEC 17799 standard Provides a gap analysis between the first and second editions of the standard to simplify transition to the new one
Related Items
-
of
Making Rain: The Secrets of Building Lifelong Client Loyalty
Andrew Sobel
Starts At
1143.0
1395.0
18% OFF
The Agenda: What Every Business Must Do to Dominate the Decade
Michael Hammer
Starts At
300.0
395.0
24% OFF
Rich Dad's Rich Kid, Smart Kid: Giving Your Child a Financial Head Start
Robert T. Kiyosaki
Starts At
446.0
595.0
25% OFF