9781501515248-1501515241-Building an Effective Security Program

Building an Effective Security Program

ISBN-13: 9781501515248
ISBN-10: 1501515241
Edition: 1
Author: Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel
Publication date: 2020
Publisher: De Gruyter
Format: Perfect Paperback 444 pages
FREE US shipping
Buy

From $46.36

Book details

ISBN-13: 9781501515248
ISBN-10: 1501515241
Edition: 1
Author: Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel
Publication date: 2020
Publisher: De Gruyter
Format: Perfect Paperback 444 pages

Summary

Building an Effective Security Program (ISBN-13: 9781501515248 and ISBN-10: 1501515241), written by authors Chris K. Williams, Scott E. Donaldson, Stanley G. Siegel, was published by De Gruyter in 2020. With an overall rating of 3.7 stars, it's a notable title among other Data Mining (Databases & Big Data, Networking & Cloud Computing, Hacking, Security & Encryption) books. You can easily purchase or rent Building an Effective Security Program (Perfect Paperback) from BooksRun, along with many other new and used Data Mining books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.44.

Description

This book establishes the business case for setting up an enduring IT security awareness program for use in training IT professionals and IT security professionals. This book details an IT security process for establishing and maintaining common security protections for the confidentiality, availability, and integrity of company information. The IT security process is applied to a series of real-world scenarios in terms of common security controls to protect company information. IT security involves understanding the challenges and managing the corresponding risks. Risk management involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls. The authors provide a pragmatic approach to balancing affordable IT security protection and risk. Readers will learn: IT Security Awareness—Exemplified in five IT security scenarios describing how to protect information at home, while traveling, at work, as an executive, and internationally IT Security Mindset—Thinking like an IT security professional IT Risk Management Process—Identifying assets, risk management process that involves asset management, security vulnerabilities, security threats, risk identification, risk mitigation, and security controls Enduring IT Security—Implementing, measuring, and continually improve IT security program
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book