Hakutulokset: Kirjoja kirjailijalta Thomas R. Peltier
yhteensä 17 hakutulosta
Information Security Fundamentals
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective …
Complete Guide to CISM Certification
The Certified Information Security Manager(CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA). It has been designed …
Information Security Risk Analysis
Risk is a cost of doing business. The question is, "What are the risks, and what are their costs?" Knowing the vulnerabilities and threats that face your organization's information …
Information Security Policies and Procedures
Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. …
Information Security Policies and Procedures
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. …
Information Security Risk Analysis
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat …
Complete Guide to CISM Certification
The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed …
Total CISSP Exam Prep Book
Written by a team of subject matter experts, many of them CISSP exam prep course instructors, this book is primarily a test prep book, not a study guide. Its goal is to help people …
Information Security Policies, Procedures, and Standards
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting …
Information Security Risk Analysis
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat …
Information Security Risk Analysis, Second Edition
The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their …
How to Complete a Risk Assessment in 5 Days or Less
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat …