Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Use coupon code “FEBRUARY20” for a 20% discount on all items! Valid until 28-02-2025

Site Logo
Site Logo

Royal Mail  express delivery to UK destinations

Regular sales and promotions

Stock updates every 20 minutes!

Building an Effective Security Program

1 in stock

Firm sale: non returnable item
SKU 9781501515248 Categories ,
Select Guide Rating
Building an Effective Security Program establishes the business case for setting up an enduring IT security awareness program for use in training IT professionals and IT security professionals. This book details an IT security process for establishi
Building an Effective Se...

£48.00

Buy new:

Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

Shipping costs: All shipping costs calculated in the cart or during the checkout process.

Standard service (normally 2-3 working days): 48hr Tracked service.

Premium service (next working day): 24hr Tracked service – signature service included.

Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

Signature Service: This service is only available for tracked items.

Leave in Safe Place: This option is available at no additional charge for tracked services.

Description

Product ID:9781501515248
Product Form:Paperback / softback
Country of Manufacture:US
Title:Building an Effective Security Program
Authors:Author: Chris Williams, Stanley Siegel, Scott Donaldson
Page Count:444
Subjects:Information technology: general topics, Information technology: general issues, Data mining, Computer security, Data mining, Computer security
Description:Select Guide Rating
Building an Effective Security Program establishes the business case for setting up an enduring IT security awareness program for use in training IT professionals and IT security professionals. This book details an IT security process for establishi
Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today''s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset-Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management-Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense-Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations-Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training-Promote effective cybersecurity practices at work, on travel, and at home, among your organization''s business leaders, IT professionals, and staff. Resilient IT Security-Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.
Imprint Name:De Gruyter
Publisher Name:De Gruyter
Country of Publication:GB
Publishing Date:2020-09-21