Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
|
Buy Now
Information Security Management Metrics - A Definitive Guide to Effective Security Monitoring and Measurement (Hardcover)
Loot Price: R2,434
Discovery Miles 24 340
|
|
Information Security Management Metrics - A Definitive Guide to Effective Security Monitoring and Measurement (Hardcover)
Expected to ship within 12 - 17 working days
|
Spectacular security failures continue to dominate the headlines
despite huge increases in security budgets and ever-more draconian
regulations. The 20/20 hindsight of audits is no longer an
effective solution to security weaknesses, and the necessity for
real-time strategic metrics has never been more critical.
Information Security Management Metrics: A Definitive Guide to
Effective Security Monitoring and Measurement offers a radical new
approach for developing and implementing security metrics essential
for supporting business activities and managing information risk.
This work provides anyone with security and risk management
responsibilities insight into these critical security questions:How
secure is my organization? How much security is enough? What are
the most cost-effective security solutions? How secure is my
organization? You can't manage what you can't measure This volume
shows readers how to develop metrics that can be used across an
organization to assure its information systems are functioning,
secure, and supportive of the organization's business objectives.
It provides a comprehensive overview of security metrics, discusses
the current state of metrics in use today, and looks at promising
new developments. Later chapters explore ways to develop effective
strategic and management metrics for information security
governance, risk management, program implementation and management,
and incident management and response. The book ensures that every
facet of security required by an organization is linked to business
objectives, and provides metrics to measure it. Case studies
effectively demonstrate specific ways that metrics can be
implemented across an enterprise to maximize business benefit. With
three decades of enterprise information security experience, author
Krag Brotby presents a workable approach to developing and managing
cost-effective enterprise information security.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.