Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking.
What You Will Learn:
Who This Book Is For:
IT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals)
Part I: Getting a Handle on Things
Chapter 1: Why Audit
Chapter 2: Assume Breach
Chapter 3: Risk Analysis: Assets and Impacts
Chapter 4: Risk Analysis: Natural Threats
Chapter 5: Risk Analysis: Adversarial Risk
Part II: Wrangling the Organization
Chapter 6: Scope
Chapter 7: Governance
Chapter 8: Talking to the Suits
Chapter 9: Talking to the Techs<
Chapter 10: Talking to the Users
Part III: Managing Risk with Controls
Chapter 11: Policy
Chapter 12: Control Design
Chapter 13: Administrative Controls
Chapter 14: Vulnerability Management
Chapter 15: People Controls
Chapter 16: Logical Access Control
Chapter 17: Network Security Controls
Chapter 18: More Technical Controls
Chapter 19: Physical Security Controls
Part IV: Being Audited
Chapter 20: Response Controls
Chapter 21: Starting the Audit
Chapter 22: Internal Audit
Chapter 23: Third Party Security
Chapter 24: Post Audit Improvement
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.