000 | 01613nam a22002177a 4500 | ||
---|---|---|---|
999 |
_c1361 _d1361 |
||
005 | 20211224131033.0 | ||
008 | 211224b ||||| |||| 00| 0 eng d | ||
020 | _a0849319587 | ||
020 | _a9780849319587 | ||
082 |
_a005.8 _bPEI |
||
100 | _aPeltier, Thomas R. | ||
245 |
_aInformation security policies and procedures : a practitioner's reference _cThomas R Peltier |
||
250 | _a2nd ed. | ||
260 |
_aBoca Raton, FL : _bAuerbach Publications, _c©2004. |
||
300 |
_axxiii, 384 pages : _billustrations, map ; _c25 cm |
||
505 |
_tWhy manage this process as a project? --
_tPlanning and preparation -- _tDeveloping policies -- _tAsset classification policy -- _tDeveloping standards -- _tDeveloping procedures -- _tCreating a table of contents -- _tUnderstanding how to sell policies, standards, and procedures. |
||
520 | _aInformation Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. | ||
650 | _aComputer security | ||
650 | _aData protection | ||
942 |
_2ddc _cG |