Pre-Owned Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard Hardcover from other stores
-
Pre-Owned Information Security...
This new volume Information Security Management Systems: A Novel Framework and...
This new volume Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard looks at information security management system standards risk management associated with information...
more
-
Information Security Managemen...
This new volume Information Security Management Systems: A Novel Framework and...
This new volume Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard looks at information security management system standards risk management associated with information...
more
-
Pre-Owned Cyber Security Manag...
The item might be beaten up but readable. May contain markings or highlighting...
The item might be beaten up but readable. May contain markings or highlighting as well as stains bent corners or any other major defect but the text is not obscured in any way.
more
-
Pre-Owned Auditing IT Infrastr...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSUR...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Information systems and IT infrastructures are no longer void from governance and compliance given recent U.S.-based compliancy laws that were consummated...
more
-
Pre-Owned Risk Management Fram...
The RMF allows an organization to develop an organization-wide risk framework ...
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements...
more
-
Pre-Owned Information Security...
This book presents a framework to model the main activities of information sec...
This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity data protection access rights management business continuity...
more
-
Pre-Owned Risk Management Fram...
9781597499958. Pre-Owned: Good condition. Trade paperback. Language: English. ...
9781597499958. Pre-Owned: Good condition. Trade paperback. Language: English. Pages: 316. Trade paperback (US). Glued binding. 316 p. Contains: Illustrations black & white. The RMF allows an organization to develop an organization-wide risk...
more
-
-
Pre-Owned Managing Risk in Inf...
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE...
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Managing Risk in Information Systems Third Edition provides a comprehensive overview of risk management and its implications on IT infrastructures and compliance....
more
-
Pre-Owned Access Control and I...
9781284198355. Pre-Owned: Good condition. Trade paperback. 3rd ed. Language: E...
9781284198355. Pre-Owned: Good condition. Trade paperback. 3rd ed. Language: English. Pages: 376. Trade paperback (US). Glued binding. 376 p. PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all...
more
-
Pre-Owned Security Policies an...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSUR...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues Third Edition offers a comprehensive end-to-end view of information security policies and frameworks from the raw...
more
-
Pre-Owned Methods and Tools fo...
A comprehensive guide to the principles and practice of configuration manageme...
A comprehensive guide to the principles and practice of configuration management--the management of software system components during updating or replacement of elements. Features of commercially available tools are described enabling critical...
more
-
Pre-Owned Information Systems ...
A novel model-driven approach to security requirements engineering that focuse...
A novel model-driven approach to security requirements engineering that focuses on socio-technical systems rather than merely technical systems. Security requirements engineering is especially challenging because designers must consider not just the...
more
-
Pre-Owned Process-Aware Inform...
In the last 10 years there has been an explosion in the number of technologies...
In the last 10 years there has been an explosion in the number of technologies standards and tools to provide process support. The book provides a unified and comprehensive overview of the principles techniques and technologies underlying the...
more
-
Pre-Owned Information Security...
A compilation of the fundamental knowledge skills techniques and tools require...
A compilation of the fundamental knowledge skills techniques and tools require by all security professionals Information Security Handbook Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the...
more
Items per page