Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Information Security Handbook - Second Edition: Enhance your proficiency in information security program development 1.4. Book. Seller Inventory # BBS-9781837632701
Quantity: 5 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781837632701
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781837632701
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781837632701
Quantity: Over 20 available
Seller: Russell Books, Victoria, BC, Canada
paperback. Condition: New. 2nd ed. Special order direct from the distributor. Seller Inventory # ING9781837632701
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781837632701_new
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. Seller Inventory # C9781837632701
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF Elektronisches BuchBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You'll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization's security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you'll have all the tools and guidance needed to fortify your organization's defenses and expand your capabilities as an information security practitioner.What you will learnIntroduce information security program best practices to your organizationLeverage guidance on compliance with industry standards and regulationsImplement strategies to identify and mitigate potential security threatsIntegrate information security architecture and engineering principles across the systems development and engineering life cycleUnderstand cloud computing, Zero Trust, and supply chain risk managementWho this book is forThis book is for information security professionals looking to understand critical success factors needed to build a successful, business-aligned information security program. Additionally, this book is well suited for anyone looking to understand key aspects of an information security program and how it should be implemented within an organization. If you're looking for an end-to-end guide to information security and risk analysis with no prior knowledge of this domain, then this book is for you.Table of ContentsInformation and Data Security FundamentalsDefining the Threat LandscapeLaying a Foundation for Information and Data SecurityInformation Security Risk ManagementDeveloping Your Information and Data Security PlanContinuous Testing and MonitoringBusiness Continuity/Disaster Recovery PlanningIncident Response PlanningDeveloping a Security Operations CenterDeveloping an Information Security Architecture ProgramCloud Security ConsiderationsZero Trust Architecture in Information SecurityThird-Party and Supply Chain Security. Seller Inventory # 9781837632701
Quantity: 1 available
Seller: Mispah books, Redhill, SURRE, United Kingdom
paperback. Condition: New. New. book. Seller Inventory # ERICA80018376327076
Quantity: 1 available