ISBN 9789339222376,Information Assurance Handbook: Effective Computer Security And Risk Management Strategies

Information Assurance Handbook: Effective Computer Security And Risk Management Strategies

Rs698 Rs775 10% OFF

Availability: Out of Stock

(Free Delivery)

We Accept
ISBN 9789339222376
Check delivery information
 
ISBN 9789339222376
Publisher

Tata McGraw - Hill Education

Publication Year 2015
ISBN-13

ISBN 9789339222376

ISBN-10 9339222377
Binding

Paperback

Number of Pages 480 Pages
Language (English)
Subject

Computer security

Information Assurance Handbook: Effective Computer Security And Risk Management Strategies
Discusses The Tools And Techniques Required To Prevent, Detect, Contain, Correct, And Recover From
Security Breaches And Other Information Assurance Failures. This Practical Resource Explains How To
Integrate Information Assurance Into Your Enterprise Planning In A Non-Technical Manner. It Leads You
Through Building An It Strategy And Offers An Organizational Approach To Identifying, Implementing, And
Controlling Information Assurance Initiatives For Small Businesses And Global Enterprises Alike.
Salient Features:
- Basic Information Assurance Principles And Concepts.
- Information Assurance Management System.
- Current Practices, Regulations, And Plans

Table Of Contents:-
Part I Information Assurance Basics 1. Developing An Information Assurance Strategy 2. The Need For Information Assurance 3. Information Assurance Principles 4. Information Assurance Concepts 5. Organizations Providing Resources For Professionals 6. Information Assurance Management System 7. Current Practices, Regulations, And Plans For Information Assurance Strategy Part Ii Information Assurance Planning Process 8. Approaches To Implementing Information Assurance 9. Organizational Structure For Managing Information Assurance 10. Asset Management 11. Information Assurance Risk Management 12. Information Assurance Policy 13. Human Resource Assurance 14. Advantages Of Certification, Accreditation, And Assurance Part Iii Risk Mitigation Process 15. Information Assurance In System Development And Acquisition 16. Physical And Environmental Security Controls 17. Information Assurance Awareness, Training, And Education (At&E) 18. Preventive Information Assurance Tools 19. Access Control Part Iv Information Assurance Detection And Recovery Processes 20. Information Assurance Monitoring Tools And Methods 21. Information Assurance Measurements And Metrics 22. Incident Handling 23. Computer Forensics 24. Business Continuity Management 25. Backup And Restoration Part V Application Of Information Assurance To Select Industries 26. Healthcare 27. Retail 28. Industrial Control Systems Part Vi Appendixes A. Suggestions For Critical Thinking Exercises B. Common Threats C. Common Vulnerabilities D. Sample Information Assurance Policy For Passwords E. Sample Risk Analysis Table F. Select Privacy Laws And Regulations By Country/Economy Or State G. Information System Security Checklist H. References And Sources Of Information I. List Of Acronyms
Scroll