A Practical Guide to Managing Information Security

A Practical Guide to Managing Information Security
Author :
Publisher : Artech House
Total Pages : 284
Release :
ISBN-10 : 1580537030
ISBN-13 : 9781580537032
Rating : 4/5 (032 Downloads)

Book Synopsis A Practical Guide to Managing Information Security by : Steve Purser

Download or read book A Practical Guide to Managing Information Security written by Steve Purser and published by Artech House. This book was released on 2004 with total page 284 pages. Available in PDF, EPUB and Kindle. Book excerpt: This groundbreaking book helps you master the management of information security, concentrating on the recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need to align the information security process as a whole with the requirements of the modern enterprise, which involves empowering business managers to manage information security-related risk. Throughout, the book places emphasis on the use of simple, pragmatic risk management as a tool for decision-making. The first book to cover the strategic issues of IT security, it helps you to: understand the difference between more theoretical treatments of information security and operational reality; learn how information security risk can be measured and subsequently managed; define and execute an information security strategy design and implement a security architecture; and ensure that limited resources are used optimally. Illustrated by practical examples, this topical volume reveals the current problem areas in IT security deployment and management. Moreover, it offers guidelines for writing scalable and flexible procedures for developing an IT security strategy and monitoring its implementation. You discover an approach for reducing complexity and risk, and find tips for building a successful team and managing communications issues within the organization. This essential resource provides practical insight into contradictions in the current approach to securing enterprise-wide IT infrastructures, recognizes the need to continually challenge dated concepts, demonstrates the necessity of using appropriate risk management techniques, and evaluates whether or not a given risk is acceptable in pursuit of future business opportunities.


A Practical Guide to Managing Information Security Related Books

A Practical Guide to Managing Information Security
Language: en
Pages: 284
Authors: Steve Purser
Categories: Business & Economics
Type: BOOK - Published: 2004 - Publisher: Artech House

GET EBOOK

This groundbreaking book helps you master the management of information security, concentrating on the recognition and resolution of the practical issues of dev
How to Cheat at Managing Information Security
Language: en
Pages: 345
Authors: Mark Osborne
Categories: Computers
Type: BOOK - Published: 2006-08-22 - Publisher: Elsevier

GET EBOOK

This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security
Information Security Governance
Language: en
Pages: 207
Authors: Krag Brotby
Categories: Computers
Type: BOOK - Published: 2009-04-22 - Publisher: John Wiley & Sons

GET EBOOK

The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of infor
Practical Information Security Management
Language: en
Pages: 253
Authors: Tony Campbell
Categories: Computers
Type: BOOK - Published: 2016-11-29 - Publisher: Apress

GET EBOOK

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an
Information Security and Privacy
Language: en
Pages: 0
Authors: Thomas J. Shaw (Attorney)
Categories: Computer security
Type: BOOK - Published: 2011 - Publisher:

GET EBOOK

This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all