Image from Google Jackets

Security policies and implementation issues / Robert Johnson, Chuck Easttom.

By: Contributor(s): Material type: TextTextSeries: Information systems security and assurancePublication details: Burlington : Jones & Bartlett, 2022.Edition: Third editionDescription: xvii, 476 pages : illustrations ; 23 cmISBN:
  • 9781284199840
Subject(s): DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9 .A25J64 2022
Contents:
Information systems security policy management -- Business drivers for information security policies -- Compliance laws and information security policy requirements -- Business challenges within the seven domains of IT responsibility -- Information security policy implementation issues -- IT security policy frameworks -- How to design, organize, implement, and maintain IT security policies -- IT security policy framework approaches -- User domain policies -- IT infrastructure security policies -- Data classification and handling policies and risk management policies -- Incident response team (IRT) policies -- IT security policy implementations -- IT security policy enforcement -- IT policy compliance and compliance technologies.
Summary: "Security Policies and Implementation Issues offers a comprehensive view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It includes real-world examples, case studies, and step-by-step exercises"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.1 Available 181838113
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.2 Available 181838114
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.3 Available 181838115
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.4 Available 181838116
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.5 Available 181838117
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.6 Not For Loan 181838118
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.7 Not For Loan 181838119
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.8 Not For Loan 181838120
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.9 Not For Loan 181838121
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) C.10 Not For Loan 181838122
Browsing Informatics and Virtual Education Library Collection shelves, Shelving location: Special Reserve, Collection: Non-fiction Close shelf browser (Hides shelf browser)
QA 76.9 .A25J64 2022 Security policies and implementation issues / QA 76.9 .A25J64 2022 Security policies and implementation issues / QA 76.9 .A25J64 2022 Security policies and implementation issues / QA 76.9 .A25J64 2022 Security policies and implementation issues / QA76.9.A25 P45 2015 Security in computing / QA76.9.A25 P45 2015 Security in computing / QA76.9.A25 P45 2015 Security in computing /

Includes bibliographical references and index.

Information systems security policy management -- Business drivers for information security policies -- Compliance laws and information security policy requirements -- Business challenges within the seven domains of IT responsibility -- Information security policy implementation issues -- IT security policy frameworks -- How to design, organize, implement, and maintain IT security policies -- IT security policy framework approaches -- User domain policies -- IT infrastructure security policies -- Data classification and handling policies and risk management policies -- Incident response team (IRT) policies -- IT security policy implementations -- IT security policy enforcement -- IT policy compliance and compliance technologies.

"Security Policies and Implementation Issues offers a comprehensive view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It includes real-world examples, case studies, and step-by-step exercises"--

There are no comments on this title.

to post a comment.
© The University of Dodoma 2020