Information Security Governance - Группа авторов

Information Security Governance - Группа авторов - 970039041443
Information Security Governance - Группа авторов - Читать онлайн, скачать книгу

Скачать книгу:
https://go.wmlogs.com/yti/NIDDINjRodHRwczovL3d3dy5saXRyZXMucnUvNDM0OTg4MzcvP2xmcm9tPTI5MDI0OIDM
Читать онлайн:
https://go.wmlogs.com/yti/PQZZQPTFodHRwczovL3d3dy5saXRyZXMucnUvcGFnZXMvcXVpY2tyZWFkLz9hcnQ9NDM0OTg4Mzcmc2tpbj1ub3JtYWwmbGZyb209MjkwMjQ4MjY0Jmw9MjkwMjQ4MjY0JndpZGdldD0xLjAwJmlmcmFtmcm

Если читали книгу - поделитесь, пожалуйста, своими впечатлениями о книге.


Тип книги: book ( Книга / Аудиокнига )
Категория книги: зарубежная компьютерная литература
Год издания:
Паблишер: John Wiley & Sons Limited
Серии:

The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival. Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers: The business case for information security Defining roles and responsibilities Developing strategic metrics Determining information security outcomes Setting security governance objectives Establishing risk management objectives Developing a cost-effective security strategy A sample strategy development The steps for implementing an effective strategy Developing meaningful security program development metrics Designing relevant information security management metrics Defining incident management and response metrics Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.

Ссылка на книгу »
https://go.wmlogs.com/yti/NIDDINjRodHRwczovL3d3dy5saXRyZXMucnUvNDM0OTg4MzcvP2xmcm9tPTI5MDI0OIDM
Читать онлайн:
https://go.wmlogs.com/yti/PQZZQPTFodHRwczovL3d3dy5saXRyZXMucnUvcGFnZXMvcXVpY2tyZWFkLz9hcnQ9NDM0OTg4Mzcmc2tpbj1ub3JtYWwmbGZyb209MjkwMjQ4MjY0Jmw9MjkwMjQ4MjY0JndpZGdldD0xLjAwJmlmcmFtmcm
Скачать книгу:
https://go.wmlogs.com/yti/NIDDINjRodHRwczovL3d3dy5saXRyZXMucnUvZ2V0dHJpYWwvP2FydD00MzQ5ODgzNyZmb3JtYXQ9dHh0Jmxmcm9tPTI5MDI0OIDM

#зарубежная #компьютерная #литература #Information #Security #Governance #book #Группа #авторов #John #Wiley #Sons #Limited #книги #библиотека #2024 #скачать_книгу #читать_онлайн #зарубежная_компьютерная_литература #информационная_безопасность

Комментарии

Комментариев нет.