The Information Systems Security Officer's Guide, Second Edition: Establishing and Managing an Information Protection Program

* Read * The Information Systems Security Officers Guide, Second Edition: Establishing and Managing an Information Protection Program by Gerald L. Kovacich CFE CPP CISSP ✓ eBook or Kindle ePUB. The Information Systems Security Officers Guide, Second Edition: Establishing and Managing an Information Protection Program D. Cannon said THE how-to job book.. One of the biggest challenges in any career is how to present yourself and your objectives to gain favorable support from others. Once you scan inside this book - youll realize how powerful it is.. Must have for ISSOs or ISSO wannabees according to J. G. Heiser. This book is the Boy Scout Senior Patrol Leaders handbook for Information Security Officers. On my honor, I will do my best, to do my duty, to my corporation and profession. It is a short book-

The Information Systems Security Officer's Guide, Second Edition: Establishing and Managing an Information Protection Program

Author :
Rating : 4.88 (908 Votes)
Asin : 0750676566
Format Type : paperback
Number of Pages : 361 Pages
Publish Date : 2015-10-09
Language : English

DESCRIPTION:

Information systems security continues to grow and change based on new technology and Internet usage trends. You'll turn to it again and again for practical information and advice on establishing and managing a successful information protection program. The new ISSO Guide is just what you need. * Six new chapters present the latest information and resources to counter information security threats* Every chapter contains opening objectives and closing summaries to clarify key points* Accessible, easy-to-read style for the busy professional. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information security program, and additional metrics to measure organization performance. It also includes six entirely new chapters on emerging trends such as high-tech fraud, investigative

D. Cannon said THE how-to job book.. One of the biggest challenges in any career is how to present yourself and your objectives to gain favorable support from others. Once you scan inside this book - you'll realize how powerful it is.. "Must have for ISSOs or ISSO wannabees" according to J. G. Heiser. This book is the Boy Scout Senior Patrol Leader's handbook for Information Security Officers. " On my honor, I will do my best, to do my duty, to my corporation and profession." It is a short book-I read it in an evening-that tries to be a complete guide to a very complex profession. Following this merit badge guidebook approach, the entire subject of risk is covered in Must have for ISSOs or ISSO wannabees This book is the Boy Scout Senior Patrol Leader's handbook for Information Security Officers. " On my honor, I will do my best, to do my duty, to my corporation and profession." It is a short book-I read it in an evening-that tries to be a complete guide to a very complex profession. Following this merit badge guidebook approach, the entire subject of risk is covered in 3 pages, and CP/DR is covered in just over 2. It just doesn't contain enough text to be the sole reference book for any single aspect of the job. pages, and CP/DR is covered in just over 2. It just doesn't contain enough text to be the sole reference book for any single aspect of the job. "Not for the INFOSEC professional" according to Peezfrog. I personally think this book (actually having read it impartially) is not good for any Information Security professional, corporate or government (IA, IAM, IASO, ISSO, ect), but, if you had to place it in any category I guess it would be in the business management end of communication compliance (maybe for a Policy Compliance Officer). Also I really think that some of the other reviewers here must have been working to promote this book. I unfortunately say this because the author creates entirely too many unique

Metrics management will help ISSOs identify areas needing improvement and methodologies for tracking resource costs and usage. Understanding these concepts is critical to competing in a global environment. Information warfare, information operations, and information assurance also receive their due in this book. One of the most interesting chapters deals with establishing a metrics-management system, which provides the basics for creating a CIAPP. It should find a place on the desk of all infosec professionals. - Security Management . The book paints an excellent portrait of an ISSO's duties, challenges, and working environments. Regardless of where you are in the security hierarchy, this is the definitive text for learning what it takes to be an effective information systems security officer (ISSO). The author emphasizes th

OTHER BOOK COLLECTION