The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program (2)
By:
Sign Up Now!
Already a Member? Log In
You must be logged into UK education collection to access this title.
Learn about membership options,
or view our freely available titles.
- Synopsis
- Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information security program, and additional metrics to measure organization performance. It also includes six entirely new chapters on emerging trends such as high-tech fraud, investigative support for law enforcement, national security concerns, and information security consulting. This essential guide covers everything from effective communication to career guidance for the information security officer. You'll turn to it again and again for practical information and advice on establishing and managing a successful information protection program.Six new chapters present the latest information and resources to counter information security threatsEvery chapter contains opening objectives and closing summaries to clarify key pointsAccessible, easy-to-read style for the busy professional
- Copyright:
- 2003
Book Details
- Book Quality:
- Publisher Quality
- Book Size:
- 361 Pages
- ISBN-13:
- 9780080491530
- Related ISBNs:
- 9780750676564
- Publisher:
- Elsevier Science
- Date of Addition:
- 09/30/21
- Copyrighted By:
- Elsevier Science & Technology
- Adult content:
- No
- Language:
- English
- Has Image Descriptions:
- No
- Categories:
- Nonfiction, Computers and Internet
- Submitted By:
- Bookshare Staff
- Usage Restrictions:
- This is a copyrighted book.