Information security policies, procedures, and standards

guidelines for effective information security management

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by MARC Bot
December 16, 2022 | History

Information security policies, procedures, and standards

guidelines for effective information security management

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.

Publish Date
Publisher
Auerbach
Language
English
Pages
297

Buy this book

Previews available in: English

Edition Availability
Cover of: Information Security Policies, Procedures, and Standards
Cover of: Information Security Policies, Procedures, and Standards
Cover of: Information Security Policies, Procedures, and Standards
Cover of: Information security policies, procedures, and standards
Cover of: Information Security Policies, Procedures, and Standards
Information Security Policies, Procedures, and Standards
2001, Taylor and Francis
Electronic resource in English
Cover of: Information Security Policies, Procedures, and Standards

Add another edition?

Book Details


Published in

Boca Raton, FL

Edition Notes

Includes bibliographical references and index.

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 P46 2002, QA76.9.A25P46 2001

The Physical Object

Pagination
xiv, 297 p.
Number of pages
297

ID Numbers

Open Library
OL22466566M
Internet Archive
informationsecur00pelt_033
ISBN 10
0849311373
LCCN
2001045194
Library Thing
716944
Goodreads
852996

First Sentence

"The purpose of information protection is to protect the valuable resources of an organization, such as information, hardware, and software."

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
December 16, 2022 Edited by MARC Bot import existing book
July 22, 2019 Edited by MARC Bot remove fake subjects
June 17, 2010 Edited by ImportBot add details from OverDrive
May 1, 2010 Edited by WorkBot merge works
December 9, 2009 Created by WorkBot add works page