Information Security Fundamentals, Second Edition by Thomas R. Peltier

By Thomas R. Peltier

Developing a data protection application that clings to the main of defense as a enterprise enabler needs to be step one in an enterprise’s attempt to construct a good safeguard software. Following within the footsteps of its bestselling predecessor, Information safeguard basics, moment version provides information protection execs with a transparent knowing of the basics of defense required to deal with the diversity of matters they'll event within the field.

The booklet examines the weather of desktop safeguard, worker roles and tasks, and customary threats. It discusses the criminal necessities that influence safeguard rules, together with Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing actual safety requisites and controls, this up to date variation bargains a pattern actual protection coverage and contains a entire record of initiatives and pursuits that make up a good info defense program.

  • Includes ten new chapters

  • Broadens its insurance of laws to incorporate FISMA, PCI compliance, and international requirements

  • Expands its insurance of compliance and governance issues

  • Adds discussions of ISO 27001, ITIL, COSO, COBIT, and different frameworks

  • Presents new details on cellular protection issues

  • Reorganizes the contents round ISO 27002

The publication discusses organization-wide regulations, their documentation, and criminal and company specifications. It explains coverage layout with a spotlight on international, topic-specific, and application-specific guidelines. Following a evaluate of asset category, it explores entry keep an eye on, the parts of actual safety, and the principles and approaches of hazard research and danger management.

The textual content concludes through describing company continuity making plans, preventive controls, restoration innovations, and the way to behavior a company effect research. every one bankruptcy within the publication has been written via a unique professional to make sure you achieve the excellent figuring out of what it takes to boost an efficient details protection program.

Show description

Read Online or Download Information Security Fundamentals, Second Edition PDF

Best information technology books

The Tao of Computing, Second Edition (Chapman & Hall/CRC Textbooks in Computing)

Describing either the sensible info of curiosity to scholars and the high-level innovations and abstractions highlighted via college, The Tao of Computing, moment variation offers a accomplished creation to desktops and desktop know-how. This variation updates its renowned predecessor with new learn workouts and multiplied dialogue questions.

Information Systems for Knowledge Management (Cognitive Science and Knowledge Management)

Increasingly more firms have gotten conscious of the significance of tacit and particular wisdom owned by way of their contributors which corresponds to their event and gathered wisdom concerning the enterprise actions. despite the fact that, contemplating the big quantity of information created and utilized in the association, specifically with the evolution of data and communications applied sciences, the enterprise needs to first ascertain the categorical wisdom on which it can be crucial to concentration.

The Mobility Revolution in the Automotive Industry: How not to miss the digital turnpike

The web of items, cloud computing, attached automobiles, immense facts, analytics — what does this need to do with the car undefined? This ebook offers information regarding the way forward for mobility developments because of digitisation, connectedness, personalisation and knowledge insights. The car is at the verge of present process a primary transformation.

Storage Area Network Administrator, Storage Architect, SAN Storage Engineer: Job Interview Bottom Line Practical Questions, Answers and advice for acing a SAN Storage job interview

Why this booklet: it's going to remind you of key SAN QuestionsStorage zone Networks tips, suggestions, evidence simply in timePerfect solutions to get employed for any SAN JobsSuccessful fibre channel SAN, NAS, activity InterviewStart & shut any SAN garage activity Interview SuccessfullyIntended audience:This is meant for a person who's attending a SAN task interview.

Additional info for Information Security Fundamentals, Second Edition

Sample text

Download PDF sample

Rated 4.32 of 5 – based on 5 votes