Building an Effective Security Program
ISBN-13:
9781501515248
ISBN-10:
1501515241
Edition:
1
Author:
Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel
Publication date:
2020
Publisher:
De Gruyter
Format:
Perfect Paperback
444 pages
Category:
Data Mining
,
Databases & Big Data
,
Networking & Cloud Computing
,
Hacking
,
Security & Encryption
FREE US shipping
Book details
ISBN-13:
9781501515248
ISBN-10:
1501515241
Edition:
1
Author:
Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel
Publication date:
2020
Publisher:
De Gruyter
Format:
Perfect Paperback
444 pages
Category:
Data Mining
,
Databases & Big Data
,
Networking & Cloud Computing
,
Hacking
,
Security & Encryption
Summary
Building an Effective Security Program (ISBN-13: 9781501515248 and ISBN-10: 1501515241), written by authors
Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel, was published by De Gruyter in 2020.
With an overall rating of 3.7 stars, it's a notable title among other
Data Mining
(Databases & Big Data, Networking & Cloud Computing, Hacking, Security & Encryption) books. You can easily purchase or rent Building an Effective Security Program (Perfect Paperback) from BooksRun,
along with many other new and used
Data Mining
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.44.
Description
This book establishes the business case for setting up an enduring IT security awareness program for use in training IT professionals and IT security professionals. This book details an IT security process for establishing and maintaining common security protections for the confidentiality, availability, and integrity of company information. The IT security process is applied to a series of real-world scenarios in terms of common security controls to protect company information. IT security involves understanding the challenges and managing the corresponding risks. Risk management involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls. The authors provide a pragmatic approach to balancing affordable IT security protection and risk. Readers will learn: IT Security Awareness—Exemplified in five IT security scenarios describing how to protect information at home, while traveling, at work, as an executive, and internationally IT Security Mindset—Thinking like an IT security professional IT Risk Management Process—Identifying assets, risk management process that involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls Enduring IT Security—Implementing, measuring, and continually improve IT security program
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}