Seller: -OnTimeBooks-, Phoenix, AZ, U.S.A.
Condition: very_good. Gently read. May have name of previous ownership, or ex-library edition. Binding tight; spine straight and smooth, with no creasing; covers clean and crisp. Minimal signs of handling or shelving. 100% GUARANTEE! Shipped with delivery confirmation, if you're not satisfied with purchase please return item for full refund. Ships USPS Media Mail.
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Seller: AwesomeBooks, Wallingford, United Kingdom
US$ 11.87
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: Very Good. Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. .
Seller: Bahamut Media, Reading, United Kingdom
US$ 11.87
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee.
Published by Packt Publishing 5/21/2021, 2021
ISBN 10: 1800566352 ISBN 13: 9781800566354
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices. Book.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 43.10
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1800566352 ISBN 13: 9781800566354
Language: English
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
US$ 60.85
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order to operationalize your organization's information security strategyLearn how to achieve security goals in your organization and reduce software riskBook DescriptionInformation security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats. The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security. By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.What you will learnUnderstand and operationalize risk management concepts and important security operations activitiesDiscover how to identify, classify, and maintain information and assetsAssess and mitigate vulnerabilities in information systemsDetermine how security control testing will be undertakenIncorporate security into the SDLC (software development life cycle)Improve the security of developed software and mitigate the risks of using unsafe softwareWho this book is forIf you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 49.92
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Published by Packt Publishing 2021-05, 2021
ISBN 10: 1800566352 ISBN 13: 9781800566354
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
US$ 45.55
Convert currencyQuantity: 10 available
Add to basketPF. Condition: New.
US$ 58.35
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Information security strategies and best practices help in filling the gap that exists between theory and reality. The book starts by showing you how to implement risk management and governance structures into your organization and goes on to cover the best.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1800566352 ISBN 13: 9781800566354
Language: English
Seller: Rarewaves.com UK, London, United Kingdom
US$ 57.80
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order to operationalize your organization's information security strategyLearn how to achieve security goals in your organization and reduce software riskBook DescriptionInformation security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats. The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security. By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.What you will learnUnderstand and operationalize risk management concepts and important security operations activitiesDiscover how to identify, classify, and maintain information and assetsAssess and mitigate vulnerabilities in information systemsDetermine how security control testing will be undertakenIncorporate security into the SDLC (software development life cycle)Improve the security of developed software and mitigate the risks of using unsafe softwareWho this book is forIf you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.
Published by Packt Publishing Limited, 2021
ISBN 10: 1800566352 ISBN 13: 9781800566354
Language: English
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
US$ 50.69
Convert currencyQuantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by Packt Publishing Limited, 2021
ISBN 10: 1800566352 ISBN 13: 9781800566354
Language: English
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by Packt Publishing, Limited, 2021
ISBN 10: 1800566352 ISBN 13: 9781800566354
Language: English
Seller: Majestic Books, Hounslow, United Kingdom
US$ 54.74
Convert currencyQuantity: 4 available
Add to basketCondition: New. Print on Demand pp. 272.
Published by Packt Publishing Limited
ISBN 10: 1800566352 ISBN 13: 9781800566354
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 55.99
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 100.
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 75.08
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Advance your career as an information security professional by turning theory into robust solutions to secure your organization Key Features:Convert the theory of your security certifications into actionable changes to secure your organization Discover how to structure policies and procedures in order to operationalize your organization's information security strategy Learn how to achieve security goals in your organization and reduce software risk Book Description: Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats. The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security. By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security. What You Will Learn:Understand and operationalize risk management concepts and important security operations activities Discover how to identify, classify, and maintain information and assets Assess and mitigate vulnerabilities in information systems Determine how security control testing will be undertaken Incorporate security into the SDLC (software development life cycle) Improve the security of developed software and mitigate the risks of using unsafe software Who this book is for: If you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.