Unavailable
Unavailable
Unavailable
Ebook431 pages5 hours
Information Security Management Principles
By David Alexander, Amanda Finch and David Sutton
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
In today’s technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The second edition includes the security of cloud-based resources and the contents have been revised to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports.
LanguageEnglish
PublisherBCS, The Chartered Institute for IT
Release dateJun 21, 2013
ISBN9781780171777
Unavailable
Author
David Alexander
David Alexander was a founder of Lion Publishing, and for 28 years a Director of the company. He spent much time researching and taking photographs for books such as The Lion Handbook to the Bible. Helping people to understand the Bible and communicating its message was a key factor in his work. David died in 2002.
Read more from David Alexander
C.R.M Pocketbook: 2nd Edition Rating: 4 out of 5 stars4/5Information Security Management Principles Rating: 3 out of 5 stars3/5The Difference Between Yesterday And Today Rating: 1 out of 5 stars1/5After the Hatching Oven Rating: 0 out of 5 stars0 ratingsMurder Points a Finger Rating: 0 out of 5 stars0 ratingsMama's Boy Rating: 0 out of 5 stars0 ratingsThe Third Golden Age of Mystery and Crime MEGAPACK®: David Alexander Rating: 0 out of 5 stars0 ratingsTerror on Broadway Rating: 0 out of 5 stars0 ratingsPOTUS Rating: 0 out of 5 stars0 ratingsDie, Little Goose: A Bret Hardin Mystery Rating: 0 out of 5 stars0 ratings
Related to Information Security Management Principles
Related ebooks
Cyber Risks for Business Professionals: A Management Guide Rating: 0 out of 5 stars0 ratingsSecuring Citrix XenApp Server in the Enterprise Rating: 0 out of 5 stars0 ratingsNetwork and Information Systems (NIS) Regulations - A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsUltimate Splunk for Cybersecurity Rating: 0 out of 5 stars0 ratingsLessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure Rating: 0 out of 5 stars0 ratingsMicrosoft Forefront Identity Manager 2010 R2 Handbook Rating: 0 out of 5 stars0 ratingsCloud Computing… Commoditizing It: The Imperative Venture for Every Enterprise Rating: 0 out of 5 stars0 ratingsVulnerability assessment A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsInformation Science Rating: 0 out of 5 stars0 ratingsPCI Compliance A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsISSEP A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsHow to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsThe Real MCTS SQL Server 2008 Exam 70-433 Prep Kit: Database Design Rating: 1 out of 5 stars1/5IT Infrastructure Utility Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsDynamic Application Security Testing A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions Rating: 1 out of 5 stars1/5IT Disaster Recovery Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBeauty Plus Brain: ....showing you how to cultivate a lethal combination of a beautiful face and a beautiful brain Rating: 0 out of 5 stars0 ratingsBiometric Authentication Methods The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsArtificial Intelligence Ethics and International Law: A TechnoSocial Vision of Artificial Intelligence in the International Life Rating: 0 out of 5 stars0 ratingsCloud Security and Risk Standards A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsProject Integration Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsComputer Security Vulnerabilities A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsInformation and Knowledge System Rating: 0 out of 5 stars0 ratingsHack Attacks Testing: How to Conduct Your Own Security Audit Rating: 0 out of 5 stars0 ratingsIT GRC A Complete Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCloud Services A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratings
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Information Security Management Principles
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews