Security Program and Policies: Principles and Practices, 2/e (Paperback)
暫譯: 安全計畫與政策:原則與實務,第2版 (平裝本)
Sari Greene
- 出版商: Prentice Hall
- 出版日期: 2014-03-19
- 定價: $2,600
- 售價: 6.0 折 $1,560
- 語言: 英文
- 頁數: 648
- 裝訂: Paperback
- ISBN: 0789751674
- ISBN-13: 9780789751676
-
相關分類:
Penetration-test
-
其他版本:
Developing Cybersecurity Programs and Policies 3rd
買這商品的人也買了...
-
精通 Python 3 程式設計, 2/e (Programming in Python 3: A Complete Introduction to the Python Language, 2/e)$680$537 -
SAS 在統計學的應用$650$585 -
深入淺出 Python (Head First Python)$780$616 -
超圖解 Arduino 互動設計入門 (附 Arduino UNO R3 開發板)$1,130$961 -
Arduino UNO R3 開發板(副廠相容版)附傳輸線$400$380 -
Arduino 基礎入門套件 (附範例程式下載連結)$950$903 -
猛虎出柙雙劍合璧版-最新 OCA / OCP Java SE 7 Programmer 專業認證$880$695 -
HC-SR04 超音波感測器$100$95 -
HDMI 轉 VGA 轉換器(帶音訊)$380$361 -
無瑕的程式碼-敏捷軟體開發技巧守則 + 番外篇-專業程式設計師的生存之道 (雙書合購)$940$700 -
EDIMAX (EW-7811Un) Wireless 802.11n 高效能隱形 USB 無線網路卡$300$285 -
R 錦囊妙計 (R Cookbook)$680$537 -
高效能網站開發指南 (High Performance Browser Networking: What every web developer should know about networking and web performance)$580$458 -
Responsive Web Design 響應式網頁設計學習手冊 (Learning Responsive Web Design: A Beginner's Guide)$580$458 -
AngularJS 建置與執行 (AngularJS: Up and Running: Enhanced Productivity with Structured Web Apps)$520$411 -
你不能錯過的 jQuery 指南:實用 X 必用 X 拿來即用的 350 段程式碼 + 256 個範例$490$387 -
精通 Python|運用簡單的套件進行現代運算 (Introducing Python: Modern Computing in Simple Packages)$780$616 -
完整學會 Git, GitHub, Git Server 的24堂課$360$284 -
黑帽 Python | 給駭客與滲透測試者的 Python 開發指南 (Black Hat Python: Python Programming for Hackers and Pentesters)$400$316 -
iOS 9 App 程式設計實力超進化實戰攻略:知名iOS教學部落格AppCoda作家親授實作關鍵技巧讓你不NG (Beginning iOS 9 Programming with Swift)$690$538 -
Make 國際中文版 vol.21 (Make: Volume 45 英文版)$260$234 -
CSS Secrets 中文版|解決網頁設計問題的有效秘訣 (CSS Secrets: Better Solutions to Everyday Web Design Problems)$680$537 -
程式設計輕鬆學 -- 使用 Scratch 2.X$350$277 -
鳥哥的 Linux 私房菜-基礎學習篇, 4/e$980$774 -
設計模式與遊戲開發的完美結合$690$538
相關主題
商品描述
Everything you need to know about information security programs and policies, in one book
- Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management
- Thoroughly updated for today’s challenges, laws, regulations, and best practices
- The perfect resource for anyone pursuing an information security management career
In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them.
Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business.
If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program.
Sari Stern Greene, CISSP, CRISC, CISM, NSA/IAM, is an information security practitioner, author, and entrepreneur. She is passionate about the importance of protecting information and critical infrastructure. Sari founded Sage Data Security in 2002 and has amassed thousands of hours in the field working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Her first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, which was soon followed by the first edition of Security Policies and Procedures: Principles and Practices. She is actively involved in the security community, and speaks regularly at security conferences and workshops. She has been quoted in The New York Times, Wall Street Journal, and on CNN, and CNBC. Since 2010, Sari has served as the chair of the annual Cybercrime Symposium.
Learn how to
· Establish program objectives, elements, domains, and governance
· Understand policies, standards, procedures, guidelines, and plans—and the differences among them
· Write policies in “plain language,” with the right level of detail
· Apply the Confidentiality, Integrity & Availability (CIA) security model
· Use NIST resources and ISO/IEC 27000-series standards
· Align security with business strategy
· Define, inventory, and classify your information and systems
· Systematically identify, prioritize, and manage InfoSec risks
· Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA)
· Implement effective physical, environmental, communications, and operational security
· Effectively manage access control
· Secure the entire system development lifecycle
· Respond to incidents and ensure continuity of operations
· Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS
商品描述(中文翻譯)
您需要了解的有關資訊安全計畫和政策的所有內容,盡在一本書中
- 清楚解釋資訊安全計畫和政策的規劃、開發、部署和管理的各個方面
- 針對當前的挑戰、法律、法規和最佳實踐進行全面更新
- 對於任何追求資訊安全管理職業的人來說,這是完美的資源
在當今危險的世界中,資訊安全的失敗可能是災難性的。組織必須保護自己。保護始於全面且現實的政策。本指南將幫助您創建、部署和管理這些政策。
內容完整且易於理解,通過實際案例解釋關鍵概念和技術。您將掌握現代資訊安全法規和框架,並學習針對金融、醫療保健、在線商務和小型企業等關鍵行業的具體最佳實踐政策。
如果您了解基本的資訊安全,您就已經準備好成功使用這本書。您將找到項目、問題、練習、範例、可輕鬆調整的資訊安全政策的有價值鏈接……一切您需要的都在這裡,以實施成功的資訊安全計畫。
Sari Stern Greene,CISSP、CRISC、CISM、NSA/IAM,是一位資訊安全從業者、作者和企業家。她對保護資訊和關鍵基礎設施的重要性充滿熱情。Sari於2002年創立了Sage Data Security,並在該領域積累了數千小時的工作經驗,與各種技術、運營和管理人員,以及董事會、監管機構和服務提供商合作。她的第一本書是Tools and Techniques for Securing Microsoft Networks,由微軟委託用於培訓其合作夥伴渠道,隨後不久便出版了Security Policies and Procedures: Principles and Practices的第一版。她積極參與安全社區,並定期在安全會議和研討會上發言。她曾在The New York Times、Wall Street Journal、CNN和CNBC上被引用。自2010年以來,Sari擔任年度網路犯罪研討會的主席。
學習如何
· 建立計畫目標、要素、領域和治理
· 理解政策、標準、程序、指導方針和計畫——以及它們之間的差異
· 用「簡單語言」撰寫政策,並具備適當的細節程度
· 應用機密性、完整性和可用性(CIA)安全模型
· 使用NIST資源和ISO/IEC 27000系列標準
· 將安全與商業策略對齊
· 定義、清點和分類您的資訊和系統
· 系統性地識別、優先排序和管理資訊安全風險
· 通過基於角色的安全教育、意識和培訓(SETA)減少「人員相關」風險
· 實施有效的物理、環境、通信和操作安全
· 有效管理存取控制
· 確保整個系統開發生命週期的安全
· 對事件做出反應並確保業務持續性
· 遵守法律和法規,包括GLBA、HIPAA/HITECH、FISMA、州數據安全和通知規則,以及PCI DSS
