What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a ...
Read More
What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Fight Cybercrime Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever securi
Read Less
Add this copy of Assessing Information Security Strategies, Tactics, to cart. $15.76, new condition, Sold by Paperbackshop rated 4.0 out of 5 stars, ships from Bensenville, IL, UNITED STATES, published 2011 by BPB Publications.
Add this copy of Assessing Information Security: Strategies, Tactics, to cart. $22.76, new condition, Sold by Pumpkin Wholesale Ltd rated 4.0 out of 5 stars, ships from Abingdon, Oxon, UNITED KINGDOM, published 2010 by IT Governance Publishing.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
New. "Fighting cybercrime is about more than bureaucracy and compliance. A key objective of any information security assessment is to ensure that the relevant policies are not just treated by the staff as a formality. Your company's approach to information security has to be integrated with your overall business goals. To protect your sensitive information and systems, you must avoid a fortress mentality and be capable of adapting to an ever-changing environment. This means you need to plan an effective strategy for deterring the cybercriminal. Assessing Information Security deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give you the founding principles around information security assessments and why they are important. The book provides a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, laws, and so on. The authors, Dr Andrew Vladimirov, Konstantin Gavrilenko and Andriej Michajlowski, are information security experts.
Add this copy of Assessing Information Security Strategies, Tactics, to cart. $23.10, new condition, Sold by Booksplease rated 4.0 out of 5 stars, ships from Southport, MERSEYSIDE, UNITED KINGDOM, published 2011 by BPB Publications.
Add this copy of Assessing Information Security: Strategies, Tactics, to cart. $53.13, good condition, Sold by Stephen White Books rated 5.0 out of 5 stars, ships from Bradford, WEST YORKSHIRE, UNITED KINGDOM, published 2010 by IT Governance Publishing.
Add this copy of Assessing Information Security: Strategies, Tactics, to cart. $72.37, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2010 by IT Governance Publishing.
Add this copy of Assessing Information Security: Strategies, Tactics, to cart. $102.72, new condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2010 by IT Governance Publishing.