9781284143454-1284143457-Security Policies and Implementation Issues with Case Lab Access: Print Bundle

Security Policies and Implementation Issues with Case Lab Access: Print Bundle

ISBN-13: 9781284143454
ISBN-10: 1284143457
Edition: 2
Author:
Publication date: 2017
Publisher: Jones & Bartlett Learning
Format: Hardcover
FREE US shipping

Book details

ISBN-13: 9781284143454
ISBN-10: 1284143457
Edition: 2
Author:
Publication date: 2017
Publisher: Jones & Bartlett Learning
Format: Hardcover

Summary

Security Policies and Implementation Issues with Case Lab Access: Print Bundle (ISBN-13: 9781284143454 and ISBN-10: 1284143457), written by authors , was published by Jones & Bartlett Learning in 2017. With an overall rating of 3.7 stars, it's a notable title among other Network Security (Security & Encryption, Networking & Cloud Computing) books. You can easily purchase or rent Security Policies and Implementation Issues with Case Lab Access: Print Bundle (Hardcover) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.46.

Description

Print Textbook & Case Study Lab Access: 180-day subscription. Please confirm the ISBNs used in your course with your instructor before placing your order; your institution may use a custom integration or an access portal that requires a different access code.

Security Policies and Implementation Issues, Second Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by an industry expert, it presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book