Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Theory Lab Access.
Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.
Labs:
Lab 1: Creating an Acceptable Use Policy Lab 2: Developing a Security Policy Framework Implementation Plan Lab 3: Defining a Security Policy Framework Lab 4: Creating a Separation of Duties Policy Lab 5: Creating a Security Awareness Policy Lab 6: Creating a Remote Access Policy Lab 7: Creating a Business Continuity Plan Policy Lab 8: Creating an Incident Response Policy Lab 9: Implementing an Information Security Policy Lab 10: Enabling Audit Trails to Monitor Policy Compliance
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Theory Lab Access.
Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.
Labs:
Lab 1: Creating an Acceptable Use Policy Lab 2: Developing a Security Policy Framework Implementation Plan Lab 3: Defining a Security Policy Framework Lab 4: Creating a Separation of Duties Policy Lab 5: Creating a Security Awareness Policy Lab 6: Creating a Remote Access Policy Lab 7: Creating a Business Continuity Plan Policy Lab 8: Creating an Incident Response Policy Lab 9: Implementing an Information Security Policy Lab 10: Enabling Audit Trails to Monitor Policy Compliance