Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4/E): Part 1
Số trang: 205
Loại file: pdf
Dung lượng: 937.56 KB
Lượt xem: 28
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.
Nội dung trích xuất từ tài liệu:
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4/E): Part 1
Nội dung trích xuất từ tài liệu:
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4/E): Part 1
Tìm kiếm theo từ khóa liên quan:
It governance Data security Computer security Data protection Business enterprises Computer networks Security measures Organizing information securityGợi ý tài liệu liên quan:
-
Ebook The Database hacker's handbook: Defending database servers – Part 1
280 trang 111 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 1
131 trang 110 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 2
226 trang 100 0 0 -
Ebook Protecting your library's digital sources: the essential guide to planning and preservation
121 trang 95 0 0 -
Ebook Information security fundamentals: Part 2
144 trang 44 0 0 -
Ebook E-business and e-commerce management: Strategy, implementation and practice - Part 2
514 trang 43 0 0 -
Lecture Data security and encryption - Chapter 8: Data encryption standard (DES)
43 trang 42 0 0 -
Lecture Computer networks: Lesson 34 - Hammad Khalid Khan
18 trang 40 0 0 -
Lecture Data security and encryption - Chapter 9: Public-key cryptography and RSA
69 trang 40 0 0 -
Ebook Security power tools: Part 1
353 trang 38 0 0