Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics

Security policies and implementation issues / Robert Johnson, Chuck Easttom.

By: Contributor(s): Material type: TextTextLanguage: English Series: ISSA Information System Security & Assurance SeriesPublisher: Burlington, MA : Jones & Bartlett Learning, 2022Edition: Third editionDescription: xvii, 476 pages : illustrations ; 23 cm PBContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781284199840
Subject(s): DDC classification:
  • 005.8 JOH
LOC classification:
  • QA76.9.A25 J64 2022
Contents:
Information systems security policy management -- Business drivers for information security policies -- Compliance laws and information security policy requirements -- Business challenges within the seven domains of IT responsibility -- Information security policy implementation issues -- IT security policy frameworks -- How to design, organize, implement, and maintain IT security policies -- IT security policy framework approaches -- User domain policies -- IT infrastructure security policies -- Data classification and handling policies and risk management policies -- Incident response team (IRT) policies -- IT security policy implementations -- IT security policy enforcement -- IT policy compliance and compliance technologies.
Summary: "Security Policies and Implementation Issues offers a comprehensive view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It includes real-world examples, case studies, and step-by-step exercises"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Book Book Ranganathan Library Computer Science and Technology 005.8 JOH (Browse shelf(Opens below)) Available 050469

Includes bibliographical references and index.

Information systems security policy management -- Business drivers for information security policies -- Compliance laws and information security policy requirements -- Business challenges within the seven domains of IT responsibility -- Information security policy implementation issues -- IT security policy frameworks -- How to design, organize, implement, and maintain IT security policies -- IT security policy framework approaches -- User domain policies -- IT infrastructure security policies -- Data classification and handling policies and risk management policies -- Incident response team (IRT) policies -- IT security policy implementations -- IT security policy enforcement -- IT policy compliance and compliance technologies.

"Security Policies and Implementation Issues offers a comprehensive view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It includes real-world examples, case studies, and step-by-step exercises"-- Provided by publisher.

There are no comments on this title.

to post a comment.
Share
This system is made operational by the in-house staff of the CUP Library.