The book illustrates how policies and procedures support the efficient running of an organization. This volume points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. This treatment details how security policies support management's directions. The authors emphasize how information security must be integrated into all business processes. They examine Tier 1, Tier 2, and Tier 3 policies.
Populaire auteurs
Cram101 Textbook Reviews (948) J.S. Bach (447) Wolfgang Amadeus Mozart (306) Collectif (268) Schrijf als eerste een recensie over dit item (265) Doug Gelbert (238) Charles Dickens (222) Princess of Patterns (211) Jules Verne (199) R.B. Grimm (197) William Shakespeare (190) Anonymous (188) Carolyn Keene (187) Gilad Soffer (187) Mark Twain (187) Philipp Winterberg (181) Edgar Allan Poe (173) Youscribe (172) Lucas Nicolato (170) Herman Melville (169)Populaire gewichtsboeken
418 KB 425 KB 435 KB 459 KB 474 KB 386 KB 445 KB 439 KB 455 KB 413 KB 432 KB 421 KB 471 KB 493 KB 472 KB 485 KB 416 KB 451 KB 369 KB 427 KB