Executive MBA in Information Security

Regular price €167.40
A01=John J. Trinckes
A01=Jr.
abc
advanced information security program development
Asymmetric Key Encryption
Author_John J. Trinckes
Author_Jr.
BCP
BIA
Block Cipher
Business Processes
Category=KJM
Category=KNS
Category=UBL
Category=UR
Category=UTF
Category=UY
CISO
COBIT
company
Computer Forensics
controls
corporate information governance
Critical Business Functions
cybersecurity leadership roles
DAC
detection
DFE
Digital Forensic
eq_bestseller
eq_business-finance-law
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
information security
Information Security Professionals
Information Security Program
Information Technology Audit
intrusion
IP Address
IP Phone
John J. Trinckes
Jr.
management
matrix
MD5
Multifactor Authentication
network
Nondiscretionary Access Controls
OSI Model
Pci DSS
protocol
regulatory compliance frameworks
Risk Assessment Report
risk management strategies
security staff recruitment
Sensitive Information
simple
SNMP
system
TEP
VoIP Solution
vulnerability assessment methods

Product details

  • ISBN 9781439810071
  • Weight: 612g
  • Dimensions: 156 x 234mm
  • Publication Date: 09 Oct 2009
  • Publisher: Taylor & Francis Inc
  • Publication City/Country: US
  • Product Form: Hardback
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

According to the Brookings Institute, an organization’s information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental concepts of information security management. Developing this knowledge and keeping it current however, requires the time and energy that busy executives like you simply don’t have.

Supplying a complete overview of key concepts, The Executive MBA in Information Security provides the tools needed to ensure your organization has an effective and up-to-date information security management program in place. This one-stop resource provides a ready-to use security framework you can use to develop workable programs and includes proven tips for avoiding common pitfalls—so you can get it right the first time.

Allowing for quick and easy reference, this time-saving manual provides those in key leadership positions with a lucid understanding of:

  • The difference between information security and IT security
  • Corporate governance and how it relates to information security
  • Steps and processes involved in hiring the right information security staff
  • The different functional areas related to information security
  • Roles and responsibilities of the chief information security officer (CISO)

Presenting difficult concepts in a straightforward manner, this concise guide allows you to get up to speed, quickly and easily, on what it takes to develop a rock-solid information security management program that is as flexible as it is secure.

Hampton, Florida, USA