Pluralsight Managing Information Security Threats & Risks (iso Iec 27002)

Pluralsight - Managing Information Security Threats & Risks (ISO/IEC 27002)  eBooks & eLearning

Posted by U.N.Owen at Jan. 22, 2016
Pluralsight - Managing Information Security Threats & Risks (ISO/IEC 27002)

Pluralsight - Managing Information Security Threats & Risks (ISO/IEC 27002)
Size: 404MB | Duration: 3h 07m | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 44.1KHz 2ch
Genre: eLearning | Level: Beginner | Language: English

This course will provide the basic knowledge you need to assign the appropriate level of value to your information, become aware of the risks and threats that could compromise your information, and take some practical steps to protect your valuable information assets.

Managing Information Security Incidents (ISO_IEC 27002) (2016)  eBooks & eLearning

Posted by naag at Sept. 20, 2016
Managing Information Security Incidents (ISO_IEC 27002) (2016)

Managing Information Security Incidents (ISO_IEC 27002)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 249 MB
Genre: eLearning | Language: English

In business, information security is everyone's responsibility. Everyonein an organization plays a part in establishing good security practices.
Managing Information Security Risks: The OCTAVE (SM) Approach by Christopher Alberts [Repost]

Managing Information Security Risks: The OCTAVE (SM) Approach by Christopher Alberts
English | July 19, 2002 | ISBN: 0321118863 | 512 Pages | CHM | 4 MB

An information security risk evaluation helps organizations evaluate organizational practice as well as the installed technology base and to make decisions based on potential impact.
Christopher Alberts, Managing Information Security Risks: The OCTAVE

Christopher Alberts, Managing Information Security Risks: The OCTAVE
ISBN: 0321118863 | edition 2002 | CHM | 512 pages | 4 mb

From the CERT Coordination Center at the SEI, this book describes OCTAVE, a new method of evaluating information security risk.@BULLET = This book is from the CERT Coordination Center and Networked Systems Survivability (NSS) group at the SEI, the Software Engineering Institute at Carnegie Mellon University. @BULLET = There is growing interest in OCTAVE. The DOD Medical Health System is one early adopter and there is also keen interest from the financial sector.

A Practical Guide to Managing Information Security  

Posted by MoneyRich at July 4, 2015
A Practical Guide to Managing Information Security

A Practical Guide to Managing Information Security (Artech House Technology Management Library) by Steve Purser
English | Mar 31, 2004 | ISBN: 1580537022 | 280 Pages | PDF | 3 MB

This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise.

Managing Information Security (Repost)  

Posted by bookwyrm at Oct. 6, 2013
Managing Information Security (Repost)

Managing Information Security By John R. Vacca
2010 | 320 Pages | ISBN: 1597495336 | PDF | 6 MB

Managing Information Security (repost)  

Posted by interes at March 13, 2013
Managing Information Security (repost)

Managing Information Security By John R. Vacca
English | 2010 | 320 Pages | ISBN: 1597495336 | PDF | 6 MB

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertise.

Managing Information Security (Repost)  

Posted by arundhati at April 6, 2012
Managing Information Security (Repost)

John R. Vacca, "Managing Information Security"
2010 | ISBN: 1597495336 | PDF | 320 pages | 8,5 MB
Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management (repost)

Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management
Wiley; 1 edition | January 3, 2006 | ISBN-10: 0471648329 | 1152 pages | PDF | 10.2 Mb

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security.
The Executive Guide to Information Security: Threats, Challenges, and Solutions

Mark Egan, Tim Mather, "The Executive Guide to Information Security: Threats, Challenges, and Solutions"
Addison-Wesley Professional | 2004 | ISBN: 0321304519 | 288 pages | PDF | 76 MB