Skip to content
Scan a barcode
Scan
Paperback Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management Book

ISBN: 0849311373

ISBN13: 9780849311376

Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$20.19
Save $99.81!
List Price $120.00
Almost Gone, Only 2 Left!

Book Overview

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you...

Customer Reviews

4 ratings

This book is truly a treasure of knowledge.

Information security policies and all of in this book. This is a great advice for business to start, continue, follow on their journey. Thomas has captured the essence of what the business of all levels want to know when it comes to developing IT policies and systems. This book is must read for all of business executive.

Really good

Really good for anyone doing infosec policy dev. this will save you a ton of time.

Excellent practical guidebook

This is the best book I've seen (so far!) about writing infosec policies and associated materials. Tom Peltier refers directly to the ISO 17799 structure and gives helpful advice on what to include under the ten sections. More than that, he guides the reader through the *process* of writing and implementing policies, even including a brief chapter on my own specialism, security awareness, and suggestions on writing style.My main quibble with the book is its inconsistency in the level of detail e.g. 41 of the 191 main text pages are devoted to information classification. There are perhaps too many lists and tables for my liking, but these may be useful as reminders of things to include.Overall, the book is helpful if you are about to write infosec policies and want to avoid some of the more common pitfalls.

Good book for Infosec Management

If you want to find out the relation between Policies, Procedures and Standards buy this book. Although the flow of text is somewhat discontinuous but the author clearly explains the underlying concepts. The examples are very illustrative and have a real world feel. The author has been on the frontlines (clearly evident throughout the text) and this distinguishes the book from rest in the pack. Very few books talk about ISO 17799 and BS7799 in detail. This book goes beyond just reproducing the standard and explains the positioning of such guidelines. The tables and checklists found in the appendices alone are worth many times the cost of the book.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured