a manager's guide to data security and ISO 27001/ISO 27002 /
Alan Calder & Steve Watkins.
4th ed.
Philadelphia :
Kogan Page Ltd.,
2008.
1 online resource (x, 372 pages)
Includes bibliographical references (pages 359-361) and index.
Acknowledgements; Introduction; 1 Why is information security necessary?; 2 The Combined Code, the Turnbull Report and Sarbanes-Oxley; 3 ISO27001; 4 Organizing information security; 5 Information security policy and scope; 6 The risk assessment and statement of applicability; 7 External parties; 8 Asset management; 9 Human resources security; 10 Physical and environmental security; 11 Equipment security; 12 Communications and operations management; 13 Controls against malicious software (malware) and back-ups; 14 Network security management and media handling.
0
With full coverage of the Turnbull Report and the Combined Code (in the UK), and the Sarbanes-Oxley Act (in the US), the book examines standards of best practice for companies looking to protect and enhance their information security management systems, allowing them to ensure that their IT security strategies are co-ordinated, coherent, comprehensive and cost effective. Each book comes with password-protected access to the www.itgovernance.co.uk website, for the latest news updates in this dynamic and constantly-changing sector. IT Governance will be essential to board members, executives, ow.
Safari Books Online
CL0500000112
IT governance.
0749452714
Business enterprises-- Computer networks-- Security measures.
Computer security.
Data protection.
Business enterprises-- Computer networks-- Security measures.