You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs. An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of th...
The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing t
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation, How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists, forms, questionnaires, and sample assessments. ...
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr
All indications are that the prevention of terrorism will be one of the major tasks of governments and regional and international organisations for some time to come. In response to the globalised nature of terrorism, anti-terrorism law and policy have become matters of global concern. Anti-terrorism law crosses boundaries between states and between domestic, regional and international law. They also cross traditional disciplinary boundaries between administrative, constitutional, criminal, immigration and military law, and the law of war. This collection is designed to contribute to the growing field of comparative and international studies of anti-terrorism law and policy. A particular feature of this collection is the combination of chapters that focus on a particular country or region in the Americas, Europe, Africa, and Asia, and overarching thematic chapters that take a comparative approach to particular aspects of anti-terrorism law and policy, including international, constitutional, immigration, privacy, maritime, aviation and financial law.
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any organization is its capacity for quick system-wide response, current emphasis needs to be placed on maintaining the integrity of IT applications, so critical to the real and the virtual infrastructure and productivity of any community or business entity. Written by international security consultant Park Foreman, Vulnerability Management demonstrates a proactive approach. ...
Informed by theories of international relations, this book assesses global political conflicts over cyberspace. It also analyzes the unique governance challenges that the Internet presents, both in terms of technical problems and control over content. The internet is a resource of unparalleled importance to all countries and societies, but the current decentralized system of Internet governance is being challenged by governments that seek to assert sovereign control over the technology. The political battles over governing the Internet-ones that are coming and conflicts that have already started-have far-reaching implications. This book analyzes the shifting nature of internet governance as ...