Security Policies And Implementation Issues | Agenda Bookshop Skip to content
Online orders placed from 19/12 onward will not arrive in time for Christmas.
Online orders placed from 19/12 onward will not arrive in time for Christmas.
A01=Chuck Easttom
A01=Robert Johnson
Age Group_Uncategorized
Age Group_Uncategorized
Author_Chuck Easttom
Author_Robert Johnson
automatic-update
Category1=Non-Fiction
Category=UTN
COP=United States
Delivery_Pre-order
Language_English
PA=Temporarily unavailable
Price_€50 to €100
PS=Active
softlaunch

Security Policies And Implementation Issues

English

By (author): Chuck Easttom Robert Johnson

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Second Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by an industry expert, it presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. Instructor Materials for Security Policies and Implementation Issues include: PowerPoint Lecture Slides Instructor's Guide Sample Course Syllabus Quiz & Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinkingputting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well. See more
Current price €68.39
Original price €71.99
Save 5%
A01=Chuck EasttomA01=Robert JohnsonAge Group_UncategorizedAuthor_Chuck EasttomAuthor_Robert Johnsonautomatic-updateCategory1=Non-FictionCategory=UTNCOP=United StatesDelivery_Pre-orderLanguage_EnglishPA=Temporarily unavailablePrice_€50 to €100PS=Activesoftlaunch

Will deliver when available.

Product Details
  • Publication Date: 06 Nov 2020
  • Publisher: Jones and Bartlett Publishers Inc
  • Publication City/Country: United States
  • Language: English
  • ISBN13: 9781284199840

About Chuck EasttomRobert Johnson

Robert Johnson (CISA CGEIT CISM CISSP) has 20 years experience dealing with all aspects of information security IT audit risk management and privacy compliance. His diverse background includes hands-on operational experience as well as providing strategic risk assessment and scoring for leadership and board-level audiences. Currently he works in the security risk management division of a large financial services insurance company. Previously he worked as a first vice president and IT audit and security advisory director at Washington Mutual (JP Morgan Chase). Dr. Chuck Easttom is the author of 32' books including several on computer security forensics and cryptography.' He has also authored scientific papers on digital forensics cyber warfare machine learning cryptography and applied mathematics. He is an inventor with 22 computer science patents.'He holds a Doctor of Science (D.Sc.) in cyber security a Ph.D. in nanotechnology a Ph.D. in computer science'and three masters degrees (one in applied computer science one in education'and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE.He also holds 55 industry certifications including many cyber security and digital forensics certifications. He has both academic and hands on forensics experience. He has served as an expert witness in U.S. court cases since 2004.' He is currently an adjunct lecturer for Georgetown University where he teaches cyber security systems engineer and cryptography and an adjunct professor for University of Dallas where he teaches a graduate course in digital forensics.'

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)
We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept