The Executive Guide to Information Security: Threats, Challenges, and Solutions



Mark Egan, Tim Mather, quot;The Executive Guide to Information Security: Threats, Challenges, and Solutionsquot;
Addison-Wesley Professional | 2004 | ISBN: 0321304519 | 288 pages | File type: PDF | 76 mb
The book provides a pragmatic approach to evaluating security at a companyand putting together an effective information security program. The bookfocuses on three key themes; People, Processes, and Technology and isorganized according to the steps executives would follow in order to developan information security program for their company. Key elements of theprogram include staffing this function at a company, putting the necessaryinternal processes in place, and implementing the appropriate technology.Business executives will find this book a good primer for understanding the keyexisting and future security issues, and for taking the necessary action to ensurethe protection of their enterprise's information assets.The objective of this book is to provide a quot;short cutquot; for executives to learnmore about information security and how it will affect their business in thefuture. An overview of information security concepts is provided, so they canbe better prepared to evaluate how their company is addressing informationsecurity.
Download
http://uploading.com/files/4aem5e58/0321304519%2BInformationSec.rar/



http://www.megaupload.com/?d=VVVKK85F






[Fast Download] The Executive Guide to Information Security: Threats, Challenges, and Solutions


Related eBooks:
Human-Computer Interaction and Cybersecurity Handbook (Human Factors and Ergonomics)
From CIA to APT: An Introduction to Cyber Security
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection
Non-Traditional Security in Asia: Dilemmas in Securitization
Reasonable Cybersecurity for Business Leaders
Security on Rails
CASP Cert Prep: 1 Risk Management
Computer Hacking: A beginners guide to computer hacking
Mobile and Wireless Network Security and Privacy
"Advanced Compiler Design and Implementation" by Steven Muchnick
CCNA Exploration Course Booklet: Routing Protocols and Concepts, Version 4.0
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.