Amazon cover image
Image from Amazon.com

Information security management principles / Andy Taylor ; David Alexander, Amanda Finch and David Sutton.

By: Contributor(s): Material type: TextTextPublisher: Swindon, UK : BCS, the Chartered Institute for IT, 2013Edition: Second editionDescription: xvi, 208 pages ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781780171753
Subject(s): DDC classification:
  • 658.478 TA.I 2013 23
LOC classification:
  • QA76.9.A25 T375 2013
Online resources:
Contents:
Information security principles -- information risk -- information security framework -- procedural and people security controls -- technical security controls -- software development and life cyle -- physical and environment security -- disaster recovery and business continuity management -- other technical aspects.
Summary: In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.
List(s) this item appears in: Engineering
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Includes bibliographical references (pages 189-190) and index.

Information security principles -- information risk -- information security framework -- procedural and people security controls -- technical security controls -- software development and life cyle -- physical and environment security -- disaster recovery and business continuity management -- other technical aspects.

In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

There are no comments on this title.

to post a comment.