000 03053nam a2200337 i 4500
999 _c32841
_d32842
003 CO-SiCUC
005 20181109171021.0
008 181109s2016 flu b 001 0 eng
020 _a9781482245899 (Tapa dura)
040 _aCO-SiCUC
_beng
_cCO-SiCUC
_bspa
_erda
041 0 _aeng
043 _an-us-fl---
082 0 4 _a005.8
_bL258 2016
_222
100 1 _aLandoll, Douglas J.
_eautor
_4aut
_933127
245 1 0 _aInformation security policies, procedures, and standards :
_ba practitioner's reference /
_cDouglas J. Landoll.
264 1 _aBoca Raton :
_bCRC Press, Taylor & Francis Group,
_cc2016.
264 4 _c©2016.
300 _axiv, 240 páginas ;
_c24 cm
336 _2rdacontent
_atexto
_btxt
337 _2rdamedia
_asin mediación
_bn
338 _2rdacarrier
_avolumen
_bnc
500 _aIncluye índice.
504 _aIncluye referencias bibliográficas.
505 0 _aChapter 1. Introduction -- Chapter 2. Information securyty policy basics -- Chapter 3. Information security policy framework -- Chapter 4. Information segurity policy details -- Chapter 5. Information segurity procedures and standards -- Chapter 6. Information segurity policy projects.
520 _aInformation Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.
_cEl texto.
590 _aIngeniería de Sistemas
650 0 4 _aNegocio
_xProcesamiento de datos
_xMedidas de seguridad.
_933128
650 0 4 _aProtección de Datos.
_910407
650 0 _aSeguridad informática.
_913882
942 _2ddc
_cBK