Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Information Security Management: Concepts and Practice By Bel G.
US $13.78
Condition:
Very Good
A book that does not look new and has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket (if applicable) included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: MD, United States
Delivery:
Estimated between Thu, Oct 16 and Wed, Oct 22 to 94104
Returns:
30 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Payments:
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:314763064262
Item specifics
- Condition
- Title
- Information Security Management: Concepts and Practice
- ISBN
- 9781420078541
- Subject Area
- Computers, Business & Economics
- Publication Name
- Information Security Management : concepts and Practice
- Publisher
- CRC Press LLC
- Item Length
- 9.6 in
- Subject
- Management Information Systems, Security / General, Information Management, Data Processing, Information Technology
- Publication Year
- 2010
- Type
- Textbook
- Format
- Hardcover
- Language
- English
- Item Height
- 1.7 in
- Item Weight
- 46.5 Oz
- Item Width
- 6.4 in
- Number of Pages
- 871 Pages
About this product
Product Identifiers
Publisher
CRC Press LLC
ISBN-10
1420078542
ISBN-13
9781420078541
eBay Product ID (ePID)
66578551
Product Key Features
Number of Pages
871 Pages
Publication Name
Information Security Management : concepts and Practice
Language
English
Subject
Management Information Systems, Security / General, Information Management, Data Processing, Information Technology
Publication Year
2010
Type
Textbook
Subject Area
Computers, Business & Economics
Format
Hardcover
Dimensions
Item Height
1.7 in
Item Weight
46.5 Oz
Item Length
9.6 in
Item Width
6.4 in
Additional Product Features
Intended Audience
College Audience
LCCN
2009-043226
Reviews
a comprehensive overview of security topics related to the management and development of secure systems. This rich collection of literature reviews matches every stage of security management, implementation, and deployment. The extensive breakdown of risk analysis and threat assessment will be of particular interest to practitioners with background in this area one of the most comprehensive works to date on the topic, and includes lengthy examples of how to determine and manage the risks associated with a new development project. The book describes most, if not all, security paradigms that are in practice today in terms of analyzing the goals of a project and establishing priorities. a valuable resource for anyone conducting research in the field of information security as well as for experienced managers seeking to concentrate on security in future endeavors. Summing Up: Highly recommended. " T.D. Richardson, South University, in CHOICE, November 2010, Vol. 48 No. 03, e a comprehensive overview of security topics related to the management and development of secure systems. This rich collection of literature reviews matches every stage of security management, implementation, and deployment. e The extensive breakdown of risk analysis and threat assessment will be of particular interest to practitioners with background in this areae one of the most comprehensive works to date on the topic, and includes lengthy examples of how to determine and manage the risks associated with a new development project. The book describes most, if not all, security paradigms that are in practice today in terms of analyzing the goals of a project and establishing priorities. e a valuable resource for anyone conducting research in the field of information security as well as for experienced managers seeking to concentrate on security in future endeavors. Summing Up: Highly recommended. e" T.D. Richardson, South University, in CHOICE, November 2010, Vol. 48 No. 03, ... a comprehensive overview of security topics related to the management and development of secure systems. This rich collection of literature reviews matches every stage of security management, implementation, and deployment. ... The extensive breakdown of risk analysis and threat assessment will be of particular interest to practitioners with background in this area... one of the most comprehensive works to date on the topic, and includes lengthy examples of how to determine and manage the risks associated with a new development project. The book describes most, if not all, security paradigms that are in practice today in terms of analyzing the goals of a project and establishing priorities. ... a valuable resource for anyone conducting research in the field of information security as well as for experienced managers seeking to concentrate on security in future endeavors. Summing Up: Highly recommended. -- T.D. Richardson, South University, in CHOICE, November 2010, Vol. 48 No. 03, ... a comprehensive overview of security topics related to the management and development of secure systems. This rich collection of literature reviews matches every stage of security management, implementation, and deployment. ... The extensive breakdown of risk analysis and threat assessment will be of particular interest to practitioners with background in this area... one of the most comprehensive works to date on the topic, and includes lengthy examples of how to determine and manage the risks associated with a new development project. The book describes most, if not all, security paradigms that are in practice today in terms of analyzing the goals of a project and establishing priorities. ... a valuable resource for anyone conducting research in the field of information security as well as for experienced managers seeking to concentrate on security in future endeavors. Summing Up: Highly recommended. -- T.D. Richardson, South University, in CHOICE, November 2010, Vol. 48 No. 03 p;lt;/EM>, November 2010, Vol. 48 No. 03, … a comprehensive overview of security topics related to the management and development of secure systems. This rich collection of literature reviews matches every stage of security management, implementation, and deployment. … The extensive breakdown of risk analysis and threat assessment will be of particular interest to practitioners with background in this area… one of the most comprehensive works to date on the topic, and includes lengthy examples of how to determine and manage the risks associated with a new development project. The book describes most, if not all, security paradigms that are in practice today in terms of analyzing the goals of a project and establishing priorities. … a valuable resource for anyone conducting research in the field of information security as well as for experienced managers seeking to concentrate on security in future endeavors. Summing Up: Highly recommended. - T.D. Richardson, South University, in CHOICE, November 2010, Vol. 48 No. 03
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Synopsis
Corporate information security is crucial for generating continuous business value in the modern world. Information security audits remain a critical component of achieving corporate security. This book presents a security audit methodology that conforms to the new security standard ISO 27001. Detailed sections illustrate how to conduct a nominal security audit that conforms with the ISO 17799 standard and a technical security audit for certification against the ISO 27001. Along with case studies that demonstrate implementation, the text provides a detailed methodology that explains how to devise a risk-driven security program as well as an effective information security management system., Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs. An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments. This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment--including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards., This supremely challenging cryptic collection contains 50 jumbo-sized puzzles, conceived to really challenge your word skills. Selected by The Times' Crossword Editor, Richard Browne, this original collection will challenge even the most experienced crossword buff. The ultimate and only jumbo cryptic crosswords available, these puzzles will allow you to give the grey matter a real workout. With unique grids of 23 x 23 squares (in comparison to the standard 15 x 15 grid), they require serious word power and cryptic puzzling skill. Put your linguistic prowess to the test with these quality puzzles from the Timese(tm) crossword writers.
LC Classification Number
QA76.9.A25R337 2010
Item description from the seller
Seller business information
VAT number: GB 724498118
Popular categories from this store
Seller feedback (556,814)
- 7***e (33)- Feedback left by buyer.Past monthVerified purchaseAmazing price and super fast shipping. Book arrived exactly as described in the correct box meant to ship books. No bumps or dings in the corner because of the attention to packaging. I'll keep an eye on this seller for another purchase. Highly recommend this seller!!!!
- 5***w (1174)- Feedback left by buyer.Past monthVerified purchaseThe book that was shown was not the book that I received. Nonetheless, when I informed the seller that it wasn't the item they advertised-/they were more than willing to make it right. Since they didn't have another copy of the title I was expecting, they promptly issued an apology; and refund full refund. I really appreciated the speed at which they were willing to make things right with this transaction. I will definitely not hesitate to do business with them again. Thank You!
- f***f (1624)- Feedback left by buyer.Past 6 monthsVerified purchaseExcellent Seller, Goes the Extra Mile. The Seller Was Incredibly Communicative. Smooth Transaction, Shipped Very Quickly, As Advertised; Good Price; Well Packaged & Delivered Within a Few Days. Item in Described Promised Condition, Thank You Very Much!!!!!!!!!!! A+Sam's Letters To Jennifer By James Patterson. 9780316000741 (#394523567865)
More to explore :
- Phonics Practice Readers,
- Theory and Practice of Counseling and Psychotherapy,
- Revision/Practice Study Paperbacks Prep,
- Revision/Practice Study Hardcovers Prep,
- Revision/Practice Workbook Study Paperbacks Prep,
- Management Textbooks,
- Revision/Practice Study Paperbacks Prep in Chinese,
- Management Textbook Textbooks,
- Revision/Practice Study Rings/Wire Bounds Prep,
- Revision/Practice Study Workbooks Prep Revised Edition