000 04059cam a2200577Ii 4500
001 9781003093688
003 FlBoTFG
005 20240213122824.0
006 m o d
007 cr cnu---unuuu
008 210723t20222022flua ob 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781000449761
_qelectronic publication
020 _a1000449769
_qelectronic publication
020 _a9781000449716
_qelectronic book
020 _a1000449718
_qelectronic book
020 _a9781003093688
_qelectronic book
020 _a100309368X
_qelectronic book
020 _z9780367554644
_qhardcover
020 _z9780367554651
_qpaperback
020 _z0367554658
020 _z036755464X
024 7 _a10.1201/9781003093688
_2doi
035 _a(OCoLC)1264399123
035 _a(OCoLC-P)1264399123
050 4 _aQA76.9.A25
_bW55 2022
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aCOM
_x039000
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aUTF
_2bicssc
082 0 4 _a658.4/78
_223
100 1 _aWilliams, Walter
_c(Telecommunications engineer),
_eauthor.
245 1 0 _aCreating an information security program from scratch /
_cWalter Williams.
250 _aFirst edition.
264 1 _aBoca Raton :
_bCRC Press,
_c2022.
264 4 _c©2022
300 _a1 online resource (ix, 212 pages) :
_billustrations (black and white)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _a1. Getting started2. The things you must do 3. Asset management 4. Vulnerability Management 5. Incident Management 6. The Endpoint 7. Email Security 8. THE NETWORK 9. Integrating security into software development 10. Disasters 11. Access Control 12. HUMAN ISSUES 13. Maturity 14. INDEX
520 _aThis book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this bookexplores competing perspectives withan eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
650 0 _aBusiness enterprises
_xComputer networks
_xSecurity measures.
650 7 _aCOMPUTERS / Security / General
_2bisacsh
650 7 _aCOMPUTERS / Management Information Systems
_2bisacsh
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003093688
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c4767
_d4767