Muutke küpsiste eelistusi

Information Security Management Principles 4th edition [Pehme köide]

  • Formaat: Paperback / softback, 340 pages, kõrgus x laius: 244x170 mm, 6 Illustrations
  • Ilmumisaeg: 25-Nov-2024
  • Kirjastus: BCS, The Chartered Institute for IT
  • ISBN-10: 1780176937
  • ISBN-13: 9781780176932
Teised raamatud teemal:
  • Formaat: Paperback / softback, 340 pages, kõrgus x laius: 244x170 mm, 6 Illustrations
  • Ilmumisaeg: 25-Nov-2024
  • Kirjastus: BCS, The Chartered Institute for IT
  • ISBN-10: 1780176937
  • ISBN-13: 9781780176932
Teised raamatud teemal:
In todays technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts.



Written in an accessible manner, Information Security Management Principles provides practical guidance and actionable steps to better prepare your workplace and your home alike, and keep your information secure. This book is a primer for those new to the subject as well as a guide for more experienced practitioners. It explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. 



This fourth edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. It aligns to the updated BCS Certification in Information Security Management Principles, which this book supports as essential reading.

Arvustused

The fourth edition of Information Security Management Principles successfully updates an already excellent handbook, that describes a complex and dynamic subject area that is key for any organisation. Providing material for the aspiring security professional, the work also includes content for the more experienced practitioner, including modern security practices concerning artificial intelligence.

John Burns LL.M, CEng, MBCS, Information Security Risk Analyst CISMP is simply the best starting point for anyone pursuing a career in information security. This book provides very clear, concise, and comprehensive insights, explanations and practical insights making it an invaluable resource making exam preparation easier and more effective for exam success.

Andrew Johnston, Head of Training, IT Governance This comprehensive guide provides an excellent foundation in information security management, offering timely insights into emerging technologies such as AI and quantum computing. A must-read for anyone entering or advancing in the field.

Jacqui Maw, Curriculum Team Leader, Computing and Emerging Technologies, Burton and South Derbyshire College This fourth edition is a hugely rewarding resource when developing skills and capabilities in Information Security Management. The book blends theoretical knowledge with real-world examples to demonstrate how the principles within the curriculum apply across all industries. The addition of industry voices throughout the book to compliment the theory is the cherry on the cake and really highlights the renewed relevance. I would highly recommend!

Lee Clough MSc, Managing Director, Pride Solutions Derby Finally, the breadth and depth of Jeremys knowledge, along with the various contributors, is represented in this comprehensive version. With even an appendix on the critical role of soft skills, this edition has everything!

Philip Blake, Managing Director, Disruptive Cyber Group In this essential resource, the authors have delivered a clear, concise and comprehensive guide to the cutting-edge concepts in the rapidly evolving field of cybersecurity. From quantum cybersecurity and AI, to Zero Trust Architecture and the latest tactics for both offensive and defensive cybersecurity, this 4th edition of Information Security Management Principles has already earned a place on my recommended reading list for cybersecurity practioners at all levels.

Mark Cross MBCS MCIIS CISSP, Principal Consultant and Founder of Envista Consulting

Chapter 1: Information Security Principles
Chapter 2: Information Risk
Chapter 3: Information Security Framework
Chapter 4: Security Operations
Chapter 5: Security Lifecycle and DevSecOps
Chapter 6: Technical Security
Chapter 7: Physical and Environmental Security
Chapter 8: Disaster Recovery and Digital Forensics
Chapter 9: Emerging Technologies
The authors are at the forefront of information security and are instrumental in shaping policy and implementing best-practice. They have gained considerable experience across a wide range of public and private sector bodies including the Home Office, MoD, RAF, Royal Navy, British Airways, Marks & Spencer and O2.