Security Policies and Implementation Issues with Theory Labs

Author:   Robert Johnson ,  Chuck Easttom
Publisher:   Jones and Bartlett Publishers, Inc
Edition:   3rd edition
ISBN:  

9781284200003


Publication Date:   15 December 2020
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $332.51 Quantity:  
Add to Cart

Share |

Security Policies and Implementation Issues with Theory Labs


Add your own review!

Overview

Theory Lab Access. Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. Labs: Lab 1: Creating an Acceptable Use Policy Lab 2: Developing a Security Policy Framework Implementation Plan Lab 3: Defining a Security Policy Framework Lab 4: Creating a Separation of Duties Policy Lab 5: Creating a Security Awareness Policy Lab 6: Creating a Remote Access Policy Lab 7: Creating a Business Continuity Plan Policy Lab 8: Creating an Incident Response Policy Lab 9: Implementing an Information Security Policy Lab 10: Enabling Audit Trails to Monitor Policy Compliance

Full Product Details

Author:   Robert Johnson ,  Chuck Easttom
Publisher:   Jones and Bartlett Publishers, Inc
Imprint:   Jones and Bartlett Publishers, Inc
Edition:   3rd edition
Weight:   0.851kg
ISBN:  

9781284200003


ISBN 10:   1284200000
Publication Date:   15 December 2020
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

Author Information

Robert Johnson (CISA, CGEIT, CISM, CISSP) has 20 years experience dealing with all aspects of information security, IT audit, risk management, and privacy compliance. His diverse background includes hands-on operational experience as well as providing strategic risk assessment and scoring for leadership and board-level audiences. Currently he works in the security risk management division of a large financial services insurance company. Previously he worked as a first vice president and IT audit and security advisory director at Washington Mutual (JP Morgan Chase). Dr. Chuck Easttom is the author of 32 books, including several on computer security, forensics, and cryptography. He has also authored scientific papers on digital forensics, cyber warfare, machine learning, cryptography, and applied mathematics. He is an inventor with 22 computer science patents.He holds a Doctor of Science (D.Sc.) in cyber security, a Ph.D. in nanotechnology, a Ph.D. in computer science,and three master’s degrees (one in applied computer science, one in education,and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. He also holds 55 industry certifications including many cyber security and digital forensics certifications. He has both academic and hands on forensics experience. He has served as an expert witness in U.S. court cases since 2004. He is currently an adjunct lecturer for Georgetown University where he teaches cyber security, systems engineer, and cryptography and an adjunct professor for University of Dallas where he teaches a graduate course in digital forensics.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List