You must be logged in to post a review.
Academic book request
Inspection copies are available to lecturers and course leaders considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with your details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
In-line with our Environmental Policy and to avoid unnecessary wastage, we provide digital access for inspection copy purposes. Print copies can be provided if books are adopted as course reading.
Please note that all requests are subject to our approval. Further details regarding our inspection copy service may be found HERE.
Security Policies and Implementation Issues
Authors: Robert Johnson, Chuck EasttomOVERVIEW
This product is available with Cybersecurity Theory Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills.
Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organisational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.
Features and Benefits
- Introduces the latest version of the COBIT(Control Objectives for Information Technologies) framework
- Covers critical regulations such as GDPR (General Data Protection Regulation)
- Examines the technical knowledge and software skills required for policy implementation
- Expanded topics such as security models and vulnerabilities
- Explores the creation of an effective IT security policy framework
- Includes coverage of new mobile policies such as:
- BYOD (Bring Your Own Device)
- CYOD (Choose Your Own Device)
- COPE (Corporate-Owned, Personally Enabled)
- Available with updated Theory Labs
TABLE OF CONTENTS
- Part 1 Information Systems Security Policy Management
- Chapter 1 Information Systems Security Policy Management
- Chapter 2 Business Drivers for Information Security Policies
- Chapter 3 Compliance Laws and Information Security Policy Requirements
- Chapter 4 Business Challenges Within the Seven Domains of IT Responsibility
- Chapter 5 Information Security Policy Implementation Issues
- Part 2 Information Security Policy Implementation Issues
- Chapter 6 IT Security Policy Frameworks
- Chapter 7 How to Design, Organize, Implement, and Maintain IT Security Policies
- Chapter 8 IT Security Policy Framework Approaches
- Chapter 9 User Domain Policies
- Chapter 10 IT Infrastructure Security Policies
- Chapter 11 Data Classification and Handling Policies and Risk Management Policies
- Chapter 12 Incident Response Team (IRT) Policies
- Part 3 Implementing and Maintaining an IT Security Policy
- Chapter 13 IT Security Policy Implementations
- Chapter 14 IT Security Policy Enforcement
- Chapter 15 IT Policy Compliance and Compliance Technologies
Related Products
Our Reviews
Blog
Last Month's Bestseller
Clinical ECGs in Paramedic Practice
‘This excellent book will be of interest and indeed of much value to anyone wanting to understand ECG interpretation. It is one that I can definitely recommend.’ Douglas Chamberlain, CBE...
ViewBecome a Class VIP!
Sign up to hear about new products, promotions and more! Plus, enjoy a 25% discount and free P&P each month!
Reviews
There are no reviews yet.