Amazon cover image
Image from Amazon.com
Image from Google Jackets

Security Policies and Implementation Issues Robert Johnson & Chuck Easttom,

By: Contributor(s): Material type: TextTextLanguage: English Publication details: Burlington : Jones & Bartlett Learning, 2020.Edition: 3rd EDITIONDescription: xxvii, 476 pages : illustrations ; 23 cmISBN:
  • 9781284199840
Subject(s): DDC classification:
  • 23 005.8 JOH
Contents:
Part 1 Information Systems Security Policy Management Chapter 1 Information Systems Security Policy Management Chapter 2 Business Drivers for Information Security Policies Chapter 3 Compliance Laws and Information Security Policy Requirements Chapter 4 Business Challenges Within the Seven Domains of IT Responsibility Chapter 5 Information Security Policy Implementation Issues Part 2 Information Security Policy Implementation Issues Chapter 6 IT Security Policy Frameworks Chapter 7 How to Design, Organize, Implement, and Maintain IT Security Policies Chapter 8 IT Security Policy Framework Approaches Chapter 9 User Domain Policies Chapter 10 IT Infrastructure Security Policies Chapter 11 Data Classification and Handling Policies and Risk Management Policies Chapter 12 Incident Response Team (IRT) Policies Part 3 Implementing and Maintaining an IT Security Policy Chapter 13 IT Security Policy Implementations Chapter 14 IT Security Policy Enforcement Chapter 15 IT Policy Compliance and Compliance Technologies
Summary: PART OF THE NEW JONES and BARTLETT LEARNING INFORMATION SYSTEMS SECURITY and ASSURANCE SERIES Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. Instructor Materials for Security Policies and Implementation Issues include: PowerPoint Lecture Slides Instructor's Guide Sample Course Syllabus Quiz and Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking-putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
General Books General Books CUTN Central Library Generalia Non-fiction 005.8 JOH (Browse shelf(Opens below)) Available 46873

Robert Johnson - CISSP, CISA, CISM, CGEIT, and CRISC
Robert Johnson (CISA, CGEIT, CISM, CISSP) has 20 years experience dealing with all aspects of information security, IT audit, risk management, and privacy compliance. His diverse background includes hands-on operational experience as well as providing strategic risk assessment and scoring for leadership and board-level audiences. Currently he works in the security risk management division of a large financial services insurance company. Previously he worked as a first vice president and IT audit and security advisory director at Washington Mutual (JP Morgan Chase).


Chuck Easttom, PhD, DSc, MEd - Adjunct Lecturer, Georgetown University, Adjunct Professor, University of Dallas
Dr. Chuck Easttom is the author of 32 books, including several on computer security, forensics, and cryptography. He has also authored scientific papers on digital forensics, cyber warfare, machine learning, cryptography, and applied mathematics. He is an inventor with 22 computer science patents. He holds a Doctor of Science (D.Sc.) in cyber security, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master’s degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE.

He also holds 55 industry certifications including many cyber security and digital forensics certifications. He has both academic and hands on forensics experience. He has served as an expert witness in U.S. court cases since 2004. He is currently an adjunct lecturer for Georgetown University where he teaches cyber security, systems engineer, and cryptography and an adjunct professor for University of Dallas where he teaches a graduate course in digital forensics.

Part 1 Information Systems Security Policy Management
Chapter 1 Information Systems Security Policy Management
Chapter 2 Business Drivers for Information Security Policies
Chapter 3 Compliance Laws and Information Security Policy Requirements
Chapter 4 Business Challenges Within the Seven Domains of IT Responsibility
Chapter 5 Information Security Policy Implementation Issues
Part 2 Information Security Policy Implementation Issues
Chapter 6 IT Security Policy Frameworks
Chapter 7 How to Design, Organize, Implement, and Maintain IT Security Policies
Chapter 8 IT Security Policy Framework Approaches
Chapter 9 User Domain Policies
Chapter 10 IT Infrastructure Security Policies
Chapter 11 Data Classification and Handling Policies and Risk Management Policies
Chapter 12 Incident Response Team (IRT) Policies
Part 3 Implementing and Maintaining an IT Security Policy
Chapter 13 IT Security Policy Implementations
Chapter 14 IT Security Policy Enforcement
Chapter 15 IT Policy Compliance and Compliance Technologies

PART OF THE NEW JONES and BARTLETT LEARNING INFORMATION SYSTEMS SECURITY and ASSURANCE SERIES Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. Instructor Materials for Security Policies and Implementation Issues include: PowerPoint Lecture Slides Instructor's Guide Sample Course Syllabus Quiz and Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking-putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well

There are no comments on this title.

to post a comment.

Powered by Koha