In a world that is demanding 24/7 availability of information and using increasingly complex types of technology, there are growing risks to information and its security. A compromise has to be struck between security of information and its availability. This book, and the ISEB 'Information Security Management Principles' qualification which it supports, provide significant first steps along the path of dealing with information security in a pragmatic and comprehensive manner.
Rezensionen / Stimmen
In looking for a technical book I look for authoritative writing; clarity of expression; knowledge; easy navigation and the sense that I am not having to work to find the information I need to get a job done. In this book I have found all of those things. Congratulations to the authors. -- A senior Whitehall security specialist (anonymous for obvious reasons) The blurb on the cover indicates it is directed at business and IT managers but it is more likely to be of use to the worker who has to set up the system. To this end, encouragement and tips are given throughout on how to justify implementaton of the systems and controls to management. * IT Training Magazine * If you want an excellent introduction to information security you could do worse than buying a copy of this book. Highly recommended. -- John Hughes * InfoSecReviews *
Sprache
Verlagsort
Verlagsgruppe
BCS Learning & Development Limited
Zielgruppe
Illustrationen
Maße
Höhe: 246 mm
Breite: 172 mm
Dicke: 12 mm
Gewicht
ISBN-13
978-1-902505-90-9 (9781902505909)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
The authors are at the forefront of information security and are instrumental in shaping policy and implementing best-practice. They have gained considerable experience across a wide range of public and private sector bodies including the Home Office, GCHQ, MoD, RAF, Royal Navy, British Airways, Marks & Spencer and O2.
1 Information Security Principles
2 Information Risk
3 Information Security Framework
4 Information Security Controls