Sold Out
Book Categories |
Acknowledgments | ||
Copyright Notice | ||
Table of Contents | ||
Figures and Illustrations | ||
Preface | ||
Introduction | 1 | |
Ch. 1 | The Information Security Program | 21 |
The Present Information Systems Environment | 23 | |
A Risk Construct | 24 | |
Information Risk Management | 26 | |
Enterprise-Wide Information Security Program Model: Functional Overview | 27 | |
The Enterprise-Wide Information Security Program Elements: Framework, Organization, Technology, and Process | 31 | |
Creating a Successful Security Program | 35 | |
Building the Security Program | 39 | |
Ch. 2 | Developing an Information Security Policy | 49 |
The Impact of the Internet | 52 | |
Characteristics of Good Information Security Policy | 54 | |
METASeS Information Security Policy Framework | 56 | |
Policy Interpretation | 66 | |
Information Security Policy Life Cycle | 68 | |
Assessing Policy Needs | 69 | |
Developing Information Security Policy | 72 | |
Implementing and Deploying Policy | 78 | |
Maintaining Information Security Policy | 82 | |
Ch. 3 | Web and e-Commerce Security | 83 |
Chapter Components | 84 | |
Information Security Goals | 85 | |
Web and e-Commerce Security Architecture | 90 | |
The Process of Formulating Architecture | 92 | |
Types of Architecture | 98 | |
System Development Life Cycle (SDLC) Methodology | 107 | |
The Underlying Infrastructure Components | 120 | |
App. A | Sample Excerpt from an Information Security Program Gap Analysis | 147 |
App. B | Excerpts from Technology Standards and Configuration Guides Publications | 153 |
App. C: Resources for Information Security and Policy | 169 | |
App. D: Examples of Processes and Procedures | 175 | |
App. E | Trends in Security Spending | 183 |
Glossary | 195 | |
Index | 201 | |
Tell Us What You Think | 205 | |
About METASeS | 207 | |
About DefenseONE-CommandCenter.com | 209 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age
X
This Item is in Your InventorySecure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age
X
You must be logged in to review the productsX
X
X
Add Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age, Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit, Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age to the inventory that you are selling on WonderClubX
X
Add Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age, Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit, Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age to your collection on WonderClub |