Muutke küpsiste eelistusi

E-raamat: Information Security A Practical Guide: Bridging the gap between IT and management

  • Formaat: 116 pages
  • Ilmumisaeg: 30-Jun-2015
  • Kirjastus: IT Governance Publishing
  • Keel: eng
  • ISBN-13: 9781849287418
  • Formaat - PDF+DRM
  • Hind: 35,04 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 116 pages
  • Ilmumisaeg: 30-Jun-2015
  • Kirjastus: IT Governance Publishing
  • Keel: eng
  • ISBN-13: 9781849287418

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.

Muu info

If youre starting a new job as an information security professional, Information Security: A Practical Guide contains all you need to know.
1: Day one as a security professional



2: Business impact of breaches



3: Business Risk Appetite



4: Threats



5: Quick and dirty risk assessment



6: Getting buy in from your peers



7: Documenting the system for everyone



8: Mapping data in the system



9: Penetration testing



10: Information Security Policy
Tom Mooney has over 10 years IT experience working with sensitive information. Currently HM Land Registrys information security risk advisor, where he works with project teams and the wider business to deliver key business systems securely, his key responsibility is to act as an intermediary between management and IT teams to ensure appropriate security controls are put in place. His extensive experience has led him to develop many skills and techniques to converse with people who are not technical or information security experts. Many of these are found in this book.





He has a BSc (Hons) in information and computer security, and is also a CESG certified professional.