|
" Information security policies and procedures : "
Thomas R. Peltier.
Document Type
|
:
|
BL
|
Record Number
|
:
|
1017058
|
Doc. No
|
:
|
b771428
|
Main Entry
|
:
|
Peltier, Thomas R.
|
Title & Author
|
:
|
Information security policies and procedures : : a practitioner's reference /\ Thomas R. Peltier.
|
Edition Statement
|
:
|
2nd ed.
|
Publication Statement
|
:
|
Boca Raton, FL :: Auerbach Publications,, ©2004.
|
Page. NO
|
:
|
xxiii, 384 pages :: illustrations, map ;; 25 cm
|
ISBN
|
:
|
0849319587
|
|
:
|
: 9780849319587
|
Notes
|
:
|
Includes index.
|
Contents
|
:
|
Why manage this process as a project? -- Planning and preparation -- Developing policies -- Asset classification policy -- Developing standards -- Developing procedures -- Creating a table of contents -- Understanding how to sell policies, standards, and procedures.
|
Abstract
|
:
|
"Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies."--Jacket.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Data protection.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Data protection.
|
Subject
|
:
|
IT-säkerhet.
|
Dewey Classification
|
:
|
005.8
|
|
:
|
658.478
|
LC Classification
|
:
|
QA76.9.A25P428 2004
|
| |