0
Your cart

Your cart is empty

Books > Business & Economics > Economics

Buy Now

Building an Effective Information Security Policy Architecture (Paperback) Loot Price: R1,908
Discovery Miles 19 080
Building an Effective Information Security Policy Architecture (Paperback): Sandy Bacik

Building an Effective Information Security Policy Architecture (Paperback)

Sandy Bacik

 (sign in to rate)
Loot Price R1,908 Discovery Miles 19 080 | Repayment Terms: R179 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.

General

Imprint: Crc Press
Country of origin: United Kingdom
Release date: September 2019
First published: 2008
Authors: Sandy Bacik
Dimensions: 234 x 156mm (L x W)
Format: Paperback
Pages: 368
ISBN-13: 978-0-367-38730-3
Categories: Books > Business & Economics > Economics > General
Books > Computing & IT > General theory of computing > General
Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Applications of computing > General
Books > Computing & IT > Social & legal aspects of computing > General
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
LSN: 0-367-38730-1
Barcode: 9780367387303

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Great Johannesburg - What Happened? How…
Nickolaus Bauer Paperback R330 R240 Discovery Miles 2 400
The Dirty Secrets Of The Rich And…
James-Brent Styan Paperback R290 R205 Discovery Miles 2 050
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, … Paperback R350 R301 Discovery Miles 3 010
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, … Paperback  (1)
R340 R292 Discovery Miles 2 920
bundle available
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, … Paperback R350 R273 Discovery Miles 2 730
The Future - More Than 80 Key Trends For…
Dion Chang, Bronwyn Williams, … Paperback R350 R255 Discovery Miles 2 550
Africa's Business Revolution - How to…
Acha Leke, Mutsa Chironga, … Hardcover  (1)
R766 R659 Discovery Miles 6 590
Closing The Gap - The Fourth Industrial…
Tshilidzi Marwala Paperback R604 Discovery Miles 6 040
Black Tax - Burden Or Ubuntu?
Niq Mhlongo Paperback  (2)
R285 R228 Discovery Miles 2 280
Race, Class And The Post-Apartheid…
John Reynolds, Ben Fine, … Paperback R290 R227 Discovery Miles 2 270
South Africa's Corporatised Liberation…
Dale T. McKinley Paperback  (1)
R280 R219 Discovery Miles 2 190
The Other End Of The Telescope - How To…
Ian Russell Paperback R250 R200 Discovery Miles 2 000

See more

Partners