wyszukanych pozycji: 15
In Search of the Lost
ISBN: 9781612354156 / Angielski / Miękka / 2018 / 326 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
92,04 zł |
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks
ISBN: 9780879302399 / Angielski / Miękka / 1991 / 176 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
|
cena:
492,71 zł |
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks
ISBN: 9781138412187 / Angielski / Twarda / 2017 Termin realizacji zamówienia: ok. 16-18 dni roboczych. Here’s your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents. You’ll learn how to identify your company’s overall need for data security; how to research any measures already being taken; how to develop employee awareness of security procedures; and how to devise an effective program that will get support from all members of your organization—from senior... Here’s your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace.... |
|
cena:
907,73 zł |
Managing a Network Vulnerability Assessment
ISBN: 9781138436886 / Angielski / Twarda / 2017 Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
|
cena:
829,92 zł |
The Total Cissp Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques
ISBN: 9781138436909 / Angielski / Twarda / 2017 Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
|
cena:
829,92 zł |
How to Complete a Risk Assessment in 5 Days or Less
ISBN: 9781420062755 / Angielski / Twarda / 2008 / 456 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation, How... Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environ... |
|
cena:
622,44 zł |
Information Security Risk Analysis
ISBN: 9781439839560 / Angielski / Twarda / 2010 / 456 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization. Providing access to more than 350 pages of helpful ancillary materials, this volume:
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environ... |
|
cena:
622,44 zł |
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition
ISBN: 9780849319587 / Angielski / Twarda / 2004 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives...
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the ef...
|
|
cena:
622,44 zł |
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
ISBN: 9780849311376 / Angielski / Miękka / 2001 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals....
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts a...
|
|
cena:
466,78 zł |
Information Security Fundamentals
ISBN: 9781439810620 / Angielski / Miękka / 2013 / 438 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise ... |
|
cena:
311,17 zł |
How to Complete a Risk Assessment in 5 Days or Less
ISBN: 9780367386412 / Angielski / Miękka / 2019 / 444 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
|
cena:
295,61 zł |
Complete Guide to CISM Certification
ISBN: 9780849353567 / Angielski / Twarda / 2006 / 474 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal...
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, desi...
|
|
cena:
492,71 zł |
Managing A Network Vulnerability Assessment
ISBN: 9780849312700 / Angielski / Miękka / 2003 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the...
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of the...
|
|
cena:
414,91 zł |
Information Security Fundamentals
ISBN: 9781138436893 / Angielski / Twarda / 2017 / 438 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise‘s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and responsibilities, and common threats. It...
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise‘s...
|
|
cena:
881,79 zł |
The Total CISSP Exam Prep Book : Practice Questions, Answers, and Test Taking Tips and Techniques
ISBN: 9780849313509 / Angielski / Miękka / 2002 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Discusses successful approaches for the CISSP exam, provides sample questions and test-taking tips, and contains an annotated bibliography section that provides advice on helpful references for a given domain.
Discusses successful approaches for the CISSP exam, provides sample questions and test-taking tips, and contains an annotated bibliography section tha...
|
|
cena:
492,71 zł |