The Executive Guide to Information Security
Addison-Wesley Educational Publishers Inc (Verlag)
978-0-321-30451-3 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
The book provides a pragmatic approach to evaluating security at a companyand putting together an effective information security program. The bookfocuses on three key themes; People, Processes, and Technology and isorganized according to the steps executives would follow in order to developan information security program for their company. Key elements of theprogram include staffing this function at a company, putting the necessaryinternal processes in place, and implementing the appropriate technology.Business executives will find this book a good primer for understanding the keyexisting and future security issues, and for taking the necessary action to ensurethe protection of their enterprise's information assets.The objective of this book is to provide a "short cut" for executives to learnmore about information security and how it will affect their business in thefuture. An overview of information security concepts is provided, so they canbe better prepared to evaluate how their company is addressing informationsecurity.
The Executive Guide to Information SecurityAbout the Authors Mark Egan is Symantec's chief information officer and vice president of information technology. He is responsible for the management of Symantec's internal business systems, computing infrastructure, and information security program. Egan led the rapid transformation of Symantec's internal information systems over the past four years, as the company grew to be the leader in Internet security. Egan brings more than 25 years of information technology experience from a variety of industries. Prior to Symantec, he held several senior-level positions with companies including Sun Microsystems, Price Waterhouse, Atlantic Richfield Corp., Martin Marietta Data Systems, and Wells Fargo Bank. He is a member of the American Management Association's Information Systems and Technology Council and serves on the technical advisory boards for Golden Gate University and the Center for Electronic Business at San Francisco State University. Egan is also co-chair of TechNet's Cyber Security Practices Adoption Campaign. Egan was a contributing author to CIO Wisdom and is a frequent speaker on best practices for information technology and information security. Egan holds a master's degree in finance and international business from the University of San Diego and a bachelor's degree in computer sciences from the University of Clarion. Tim Mather is Symantec's vice president and chief information security officer and is a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Manager (CISM). As the chief information security officer, he is responsible for the development of all information systems security policies, oversight of implementation of all security-related policies and procedures, and all information systems audit-related activities. He also works closely with internal products groups on security capabilities in Symantec products. Prior to joining Symantec in September 1999, Mather was the manager of security at VeriSign. In addition, he was formerly manager of information systems security at Apple Computer. Mather's experience also includes seven years in Washington, D.C. working on secure communications for a classified, national-level command, control, communications, and intelligence (C3I) project, which involved both civilian and military departments and agencies. Mather holds master's degrees in national security studies from Georgetown University and international policy studies from Monterey Institute of International Studies. He holds a bachelor's degree in political economics from the University of California at Berkeley. © Copyright Pearson Education. All rights reserved.
Foreword.
Preface.
1. The Information Security Challenge.
2. Information Security Overview.
3. Developing Your Information Security Program.
4. People.
5. Process.
6. Technology.
7. Information Security Roadmap.
8. View Into The Future.
9. Summary.
Appendix A. Security Evaluation Framework.
Appendix B. Information Security Web Sites.
Appendix C. Operational Security Standards.
Appendix D. Sample Security Job Descriptions.
Glossary.
Index.
Erscheint lt. Verlag | 9.12.2004 |
---|---|
Verlagsort | New Jersey |
Sprache | englisch |
Maße | 176 x 234 mm |
Gewicht | 430 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-321-30451-9 / 0321304519 |
ISBN-13 | 978-0-321-30451-3 / 9780321304513 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich