Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.
Inhaltsangabe
Chapter 01: Why is information security necessary?; Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes Oxley; Chapter 03: ISO27001; Chapter 04: Organizing information security; Chapter 05: Information security policy and scope; Chapter 06: The risk assessment and Statement of Applicability; Chapter 07: Mobile devices; Chapter 08: Human resources security; Chapter 09: Asset management; Chapter 10: Media handling; Chapter 11: Access control; Chapter 12: User access management; Chapter 13: System and application access control; Chapter 14: Cryptography; Chapter 15: Physical and environmental security; Chapter 16: Equipment security; Chapter 17: Operations security; Chapter 18: Controls against malicious software (malware); Chapter 19: Communications management; Chapter 20: Exchanges of information; Chapter 21: System acquisition, development and maintenance; Chapter 22: Development and support processes; Chapter 23: Supplier relationships; Chapter 24: Monitoring and information security incident management; Chapter 25: Business and information security continuity management; Chapter 26: Compliance; Chapter 27: The ISO27001 audit
Chapter 01: Why is information security necessary?; Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes Oxley; Chapter 03: ISO27001; Chapter 04: Organizing information security; Chapter 05: Information security policy and scope; Chapter 06: The risk assessment and Statement of Applicability; Chapter 07: Mobile devices; Chapter 08: Human resources security; Chapter 09: Asset management; Chapter 10: Media handling; Chapter 11: Access control; Chapter 12: User access management; Chapter 13: System and application access control; Chapter 14: Cryptography; Chapter 15: Physical and environmental security; Chapter 16: Equipment security; Chapter 17: Operations security; Chapter 18: Controls against malicious software (malware); Chapter 19: Communications management; Chapter 20: Exchanges of information; Chapter 21: System acquisition, development and maintenance; Chapter 22: Development and support processes; Chapter 23: Supplier relationships; Chapter 24: Monitoring and information security incident management; Chapter 25: Business and information security continuity management; Chapter 26: Compliance; Chapter 27: The ISO27001 audit
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826