Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Security Strategy - From Requirements to Reality (Paperback, New)
Loot Price: R2,070
Discovery Miles 20 700
|
|
Security Strategy - From Requirements to Reality (Paperback, New)
Expected to ship within 12 - 17 working days
|
Donate to Against Period Poverty
Total price: R2,080
Discovery Miles: 20 800
|
Addressing the diminished understanding of the value of security on
the executive side and a lack of good business processes on the
security side, Security Strategy: From Requirements to Reality
explains how to select, develop, and deploy the security strategy
best suited to your organization. It clarifies the purpose and
place of strategy in an information security program and arms
security managers and practitioners with a set of security tactics
to support the implementation of strategic planning initiatives,
goals, and objectives. The book focuses on security strategy
planning and execution to provide a clear and comprehensive look at
the structures and tools needed to build a security program that
enables and enhances business processes. Divided into two parts,
the first part considers business strategy and the second part
details specific tactics. The information in both sections will
help security practitioners and mangers develop a viable synergy
that will allow security to take its place as a valued partner and
contributor to the success and profitability of the enterprise.
Confusing strategies and tactics all too often keep organizations
from properly implementing an effective information protection
strategy. This versatile reference presents information in a way
that makes it accessible and applicable to organizations of all
sizes. Complete with checklists of the physical security
requirements that organizations should consider when evaluating or
designing facilities, it provides the tools and understanding to
enable your company to achieve the operational efficiencies, cost
reductions, and brand enhancements that are possible when an
effective security strategy is put into action.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.