Sold Out
Book Categories |
Preface | ||
Acknowledgments | ||
About the Author | ||
Introduction | ||
Sect. I | The Working Environment of an ISSO | 1 |
1 | Understanding the Information World Environment | 3 |
2 | Understanding the Business and Management Environment | 27 |
3 | Understanding Today's Threats to Information Assets | 47 |
4 | The International Widget Corporation (IWC) | 77 |
Sect. II | The Duties and Responsibilities of an ISSO | 95 |
5 | The ISSO's Position, Duties, and Responsibilities | 97 |
6 | The InfoSec Strategic, Tactical, and Annual Plans | 113 |
7 | Establishing a CIAPP and InfoSec Organization | 125 |
8 | Determining and Establishing InfoSec Functions | 165 |
9 | Establishing a Metrics Management System | 195 |
10 | Annual Reevaluation and Future Plans | 229 |
11 | High-Technology Crimes Investigative Support | 241 |
12 | InfoSec in the Interest of National Security | 251 |
Sect. III | The Global, Professional, and Personal Challenges of an ISSO | 263 |
13 | The Related World of Information Warfare, Information Operations, and Information Assurance | 265 |
14 | The ISSO and Ethical Conduct | 283 |
15 | ISSO Career Development | 295 |
16 | How to Market Yourself as an ISSO | 317 |
17 | So, Are You Ready to Become an InfoSec Consultant? | 327 |
18 | 21st-Century Challenges for the ISSO | 339 |
Index | 355 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionThe Information Systems Security Guide: Establishing and Managing an Information Protection Program
X
This Item is in Your InventoryThe Information Systems Security Guide: Establishing and Managing an Information Protection Program
X
You must be logged in to review the productsX
X
X
Add The Information Systems Security Guide: Establishing and Managing an Information Protection Program, Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority, The Information Systems Security Guide: Establishing and Managing an Information Protection Program to the inventory that you are selling on WonderClubX
X
Add The Information Systems Security Guide: Establishing and Managing an Information Protection Program, Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority, The Information Systems Security Guide: Establishing and Managing an Information Protection Program to your collection on WonderClub |