Security policies and implementation issues / Robert Johnson, Chuck Easttom.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9781284199840
- 005.8 23
- QA76.9 .A25J64 2022
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
Informatics and Virtual Education Library Collection General Collection | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.1 | Available | 181838113 | ||
![]() |
Informatics and Virtual Education Library Collection General Collection | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.2 | Available | 181838114 | ||
![]() |
Informatics and Virtual Education Library Collection General Collection | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.3 | Available | 181838115 | ||
![]() |
Informatics and Virtual Education Library Collection General Collection | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.4 | Available | 181838116 | ||
![]() |
Informatics and Virtual Education Library Collection General Collection | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.5 | Available | 181838117 | ||
![]() |
Informatics and Virtual Education Library Collection Special Reserve | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.6 | Not For Loan | 181838118 | ||
![]() |
Informatics and Virtual Education Library Collection Special Reserve | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.7 | Not For Loan | 181838119 | ||
![]() |
Informatics and Virtual Education Library Collection Special Reserve | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.8 | Not For Loan | 181838120 | ||
![]() |
Informatics and Virtual Education Library Collection Special Reserve | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.9 | Not For Loan | 181838121 | ||
![]() |
Informatics and Virtual Education Library Collection Special Reserve | Non-fiction | QA 76.9 .A25J64 2022 (Browse shelf(Opens below)) | C.10 | Not For Loan | 181838122 |
Browsing Informatics and Virtual Education Library Collection shelves, Shelving location: Special Reserve, Collection: Non-fiction Close shelf browser (Hides shelf browser)
QA 76.9 .A25J64 2022 Security policies and implementation issues / | QA 76.9 .A25J64 2022 Security policies and implementation issues / | QA 76.9 .A25J64 2022 Security policies and implementation issues / | QA 76.9 .A25J64 2022 Security policies and implementation issues / | QA76.9.A25 P45 2015 Security in computing / | QA76.9.A25 P45 2015 Security in computing / | QA76.9.A25 P45 2015 Security in computing / |
Includes bibliographical references and index.
Information systems security policy management -- Business drivers for information security policies -- Compliance laws and information security policy requirements -- Business challenges within the seven domains of IT responsibility -- Information security policy implementation issues -- IT security policy frameworks -- How to design, organize, implement, and maintain IT security policies -- IT security policy framework approaches -- User domain policies -- IT infrastructure security policies -- Data classification and handling policies and risk management policies -- Incident response team (IRT) policies -- IT security policy implementations -- IT security policy enforcement -- IT policy compliance and compliance technologies.
"Security Policies and Implementation Issues offers a comprehensive view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It includes real-world examples, case studies, and step-by-step exercises"--
There are no comments on this title.