A practical guide to managing information security

This groundbreaking book helps you master the management of information security, concentrating on the recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercia...

Full description

Saved in:
Bibliographic Details
Main Author: Purser, Steve (Author)
Format: Unknown
Language:English
Published: London Artech House 2004
Series:Artech House technology management and professional development library
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-351453
005 20191199138
008 t2004 -UK ag| |#001 #deng#D
020 # # |a 9781580537025  |q hardback 
040 # # |a DLC  |d ITMB  |e rda 
041 0 # |a eng 
090 0 0 |a QA76.9.A25  |b P88 2004 
100 1 # |a Purser, Steve  |e author 
245 1 2 |a A practical guide to managing information security  |c Steve Purser 
264 # 1 |a London  |b Artech House  |c 2004 
300 # # |a xvii, 259 pages  |b illustration  |c 26 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
490 1 # |a Artech House technology management and professional development library 
504 # # |a Includes bibliographical references and index 
520 # # |a This groundbreaking book helps you master the management of information security, concentrating on the recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need to align the information security process as a whole with the requirements of the modern enterprise, which involves empowering business managers to manage information security-related risk. Throughout, the book places emphasis on the use of simple, pragmatic risk management as a tool for decision-making. The first book to cover the strategic issues of IT security, it helps you to: understand the difference between more theoretical treatments of information security and operational reality; learn how information security risk can be measured and subsequently managed; define and execute an information security strategy design and implement a security architecture; and ensure that limited resources are used optimally. Illustrated by practical examples, this topical volume reveals the current problem areas in IT security deployment and management. Moreover, it offers guidelines for writing scalable and flexible procedures for developing an IT security strategy and monitoring its implementation. You discover an approach for reducing complexity and risk, and find tips for building a successful team and managing communications issues within the organization. This essential resource provides practical insight into contradictions in the current approach to securing enterprise-wide IT infrastructures, recognizes the need to continually challenge dated concepts, demonstrates the necessity of using appropriate risk management techniques, and evaluates whether or not a given risk is acceptable in pursuit of future business opportunities. 
650 # 0 |a Computer security  |x Management 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=351453 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||