In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The second edition includes the security of cloud-based resources and the contents have been revised to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports.
Rezensionen / Stimmen
Although the book is targeted at students taking the CISMP examination, I would still recommend this book for any IT professional wishing to understand more about information security. The language used in the book is very accessible, so I would also recommend it to any senior manager wishing to understand the basics. If you want an excellent introduction to information security you could do worse than buying a copy of this book. Highly recommended. -- John Hughes * InfoSec Skills * The security of personal information must keep pace with technology in order to provide a safe and secure environment. This 2nd edition provides a timely update to ensure that BCS remains as an important leader in the education of information security principles. -- David Smith * Information Commissioner's Office *
Auflage
Sprache
Verlagsort
Verlagsgruppe
BCS Learning & Development Limited
Zielgruppe
Illustrationen
Maße
Höhe: 244 mm
Breite: 170 mm
ISBN-13
978-1-78017-175-3 (9781780171753)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
The authors are at the forefront of information security and are instrumental in shaping policy and implementing best-practice. They have gained considerable experience across a wide range of public and private sector bodies including the Home Office, MoD, RAF, Royal Navy, British Airways, Marks & Spencer and O2.
Authors
Acknowledgement
Abbreviations
Glossary
Preface
Information security principles
Information risk
Information security framework
Procedural and people security controls
Technical security controls
Software development and life cycle
Physical and environmental security
Disaster recovery and business continuity management
Other technical aspects
Appendix
Index