How to Achieve 27001 Certification: An Example of Applied Compliance Management
Publisher: Auerbach Publication
Language: English
ISBN: 0849336481
Paperback: 352 pages
Data: Nov 2007
Format: PDF
Description: The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process. Using security standards ISO 17799 and ISO 27001 as a basis, How to Achieve 27001 Certification: An Example of Applied Compliance Management helps an organization align its security and organizational goals so it can generate effective security, compliance, and management programs. The authors offer insight from their own experiences, providing questions and answers to determine an organization’s information security strengths and weaknesses with respect to the standard. They also present step-by-step information to help an organization plan an implementation, as well as prepare for certification and audit. Security is no longer a luxury for an organization, it is a legislative mandate. A formal methodology that helps an organization define and execute an ISMS is essential in order to perform and prove due diligence in upholding stakeholder interests and legislative compliance. Providing a good starting point for novices, as well as finely tuned nuances for seasoned security professionals, this book is an invaluable resource for anyone involved with meeting an organization’s security, certification, and compliance needs.
Rapidshare
کد:
http://rapidshare.com/files/140202888/0749452714.zip
IT Governance: A Manager’s Guide to Data Security and ISO 27001 / ISO 27002
Publisher: Kogan Page
Language: English
ISBN: 0749452714
Paperback: 384 pages
Data: Jun 2008
Format: PDF
Description: Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud. Directors must respond to increasingly complex and competing demands regarding data protection, privacy regulations, computer misuse, and investigatory regulations. IT Governance will be valuable to board members, executives, owners and managers of any business or organization that depends on information.
Covering the Sarbanes-Oxley Act (in the US) and the Turnbull Report and the Combined Code (in the UK), the book examines standards of best practice for compliance and data security. Written for companies looking to protect and enhance their information security management systems, it allows them to ensure that their IT security strategies are coordinated, coherent, comprehensive and cost effective.
Rapidshare
کد:
http://rapidshare.com/files/140202888/0749452714.zip
Information Security Governance
Publisher: Wiley
Language: English
ISBN: 0470131187
Paperback: 208 pages
Data: Apr 2009
Format: PDF
Description: This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive book.
Rapidshare
کد:
http://rapidshare.com/files/228098490/brotby.rar