or
Sign in to turn on 1-Click ordering.
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Tell the Publisher!
Id like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies [Paperback]

Corey Schou , Steven Hernandez

Price: 40.99 & FREE Delivery in the UK. Details
Pre-order Price Guarantee. Learn more.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
This title has not yet been released.
You may pre-order it now and we will deliver it to you when it arrives.
Dispatched from and sold by Amazon. Gift-wrap available.
Amazon.co.uk Trade-In Store
Did you know you can use your mobile to trade in your unwanted books for an Amazon.co.uk Gift Card to spend on the things you want? Visit the Books Trade-In Store for more details or check out the Trade-In Amazon Mobile App Guidelines on how to trade in using a smartphone. Learn more.

Book Description

1 Aug 2014

A clear, actionable blueprint for securing the vital information and IT services of global organizations of all sizes

Information Assurance Handbook provides an overall strategy for safeguarding your organization’s critical data. The book presents a body of knowledge and outlines the steps necessary for senior management to effectively work with risk and learn to strategically, systematically, and economically plan for security challenges.

You’ll learn how to implement technology, practices, and processes to mitigate and manage risk over time and also how to prevent, detect, contain, and recover from security breaches. The professional practices outlined are essential knowledge for effective security and risk management.

  • Reveals how to predict known--and yet unknown--security risks
  • Invaluable best practices technically vetted by a panel of global security leaders
  • Outlines privacy law and critical standards and practices required to make strategic choices about compliance, risk acceptance, and performance
  • Explains the critical differences between assets, threats, vulnerabilities, and controls to achieve effective decision-making for risk management throughout all levels of the organization


Special Offers and Product Promotions

  • Pre-order Price Guarantee: order now and if the Amazon.co.uk price decreases between the time you place your order and the release date, you'll be charged the lowest price. Here's how (terms and conditions apply)

Product details


Product Description

About the Author

Corey Schou, Ph.D., CSSLP, (Pocatello, ID) is a fellow and vice chairperson of (ISC)2, a professor of informatics at Idaho State University, and the director of the Informatics Research Institute and the National Information Assurance Training and Education Center.

Steven Hernandez, MBA, CISSP, (Fairfax, VA) is OIG Chief Information Security Officer at the U.S. Department of Health and Human Services and affiliate faculty at Idaho State University. He sits on the ACT-IAC Big Data Committee for security, privacy, and data management.


Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star
This item has not been released yet and is not eligible to be reviewed.
ARRAY(0xa637d1b0)

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback