Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition providesinformation security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. The book examines the elements of computer security, employee roles and...
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise ...
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization.
Providing access to more than 350 pages of helpful ancillary materials, this volume:
Presents and...
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environ...