skip to content
Information security policies and procedures : a practitioner's reference Preview this item
ClosePreview this item
Checking...

Information security policies and procedures : a practitioner's reference

Author: Thomas R Peltier
Publisher: Boca Raton, FL : Auerbach Publications, ©2004.
Edition/Format:   Print book : English : 2nd edView all editions and formats
Summary:
"Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Thomas R Peltier
ISBN: 0849319587 9780849319587
OCLC Number: 54356677
Notes: Includes index.
Description: xxiii, 384 pages : illustrations, map ; 25 cm
Contents: Why manage this process as a project? --
Planning and preparation --
Developing policies --
Asset classification policy --
Developing standards --
Developing procedures --
Creating a table of contents --
Understanding how to sell policies, standards, and procedures.
Responsibility: Thomas R. Peltier.
More information:

Abstract:

Shows how information security must be integrated into various aspects of the business process. This book examines Tier 1, Tier 2, and Tier 3 policies.  Read more...

Reviews

Editorial reviews

Publisher Synopsis

The path to information security is a long one, but in this book author Thomas Peltier makes the scenery attractive along the way. Peltier walks the reader through [the text] with clarity, Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/54356677> # Information security policies and procedures : a practitioner's reference
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "54356677" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/801769765#Place/boca_raton_fl> ; # Boca Raton, FL
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    schema:about <http://dewey.info/class/658.478/e21/> ;
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/801769765#Topic/it_sakerhet> ; # IT-säkerhet
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:bookEdition "2nd ed." ;
    schema:bookFormat bgn:PrintBook ;
    schema:copyrightYear "2004" ;
    schema:creator <http://viaf.org/viaf/65693642> ; # Thomas R. Peltier
    schema:datePublished "2004" ;
    schema:description "Why manage this process as a project? -- Planning and preparation -- Developing policies -- Asset classification policy -- Developing standards -- Developing procedures -- Creating a table of contents -- Understanding how to sell policies, standards, and procedures."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/801769765> ;
    schema:inLanguage "en" ;
    schema:name "Information security policies and procedures : a practitioner's reference"@en ;
    schema:productID "54356677" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/54356677#PublicationEvent/boca_raton_fl_auerbach_publications_2004> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/801769765#Agent/auerbach_publications> ; # Auerbach Publications
    schema:reviews <http://www.worldcat.org/title/-/oclc/54356677#Review/-981081789> ;
    schema:workExample <http://worldcat.org/isbn/9780849319587> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA4Y2016> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/54356677> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/801769765#Agent/auerbach_publications> # Auerbach Publications
    a bgn:Agent ;
    schema:name "Auerbach Publications" ;
    .

<http://experiment.worldcat.org/entity/work/data/801769765#Place/boca_raton_fl> # Boca Raton, FL
    a schema:Place ;
    schema:name "Boca Raton, FL" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/65693642> # Thomas R. Peltier
    a schema:Person ;
    schema:familyName "Peltier" ;
    schema:givenName "Thomas R." ;
    schema:name "Thomas R. Peltier" ;
    .

<http://worldcat.org/isbn/9780849319587>
    a schema:ProductModel ;
    schema:isbn "0849319587" ;
    schema:isbn "9780849319587" ;
    .

<http://www.worldcat.org/title/-/oclc/54356677>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/54356677> ; # Information security policies and procedures : a practitioner's reference
    schema:dateModified "2018-11-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .

<http://www.worldcat.org/title/-/oclc/54356677#Review/-981081789>
    a schema:Review ;
    schema:itemReviewed <http://www.worldcat.org/oclc/54356677> ; # Information security policies and procedures : a practitioner's reference
    schema:reviewBody ""Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.