000 02423 a2200193 4500
020 _a0849374952
020 _a9780849374951
082 0 4 _a005.8
_bINF
100 1 _aTipton, Harold F.
_9915
245 1 0 _aInformation security management handbook
_cHarold F. Tipton
250 _a6th ed.
260 _aBoca Raton
_bCRC
_c2007
300 _a3231p.
500 _aHB
520 _aNever before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice. The sixth edition of the Information Security Management Handbook addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking. US federal and state legislators continue to make certain that information security is a board-level conversation and the Information Security Management Handbook, Sixth Edition continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation.
650 4 _aComputer security-Management-Handbooks, Manuals
_aData protection-Handbooks, Manuals
_99550
700 1 _aKrause, Micki (ed.)
_99551
942 _cREF
999 _c32924
_d32924