Robert Johnson; Chuck Easttom
Jones & Bartlett Learning
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES The third edition of Security Policies and Implementation Issues provides a holistic and all-encompassing perspective on information security policies and frameworks, from the fundamental organizational mechanics of constructing to the psychological aspects of putting them into practice. The new Third Edition of this book, which was written by professionals in the field, strikes an effective balance between technical knowledge and soft skills, while also introducing many different concepts of information security in clear and simple terms. These concepts include governance, regulatory mandates, business drivers, legal considerations, and a great deal more. This book is an essential resource for students, security officers, auditors, and risk leaders who are interested in fully comprehending the process of successfully implementing successful sets of security policies and frameworks. It includes examples that are broken down into step-by-step instructions and real-world exercises. The following items are included in the Instructor Materials for Security Policies and Implementation Issues: Lecture Slides Presented in PowerPoint Instructor's Guide Sample Course Syllabus Quiz & Exam Questions Case Scenarios/Handouts Concerning the Series This particular volume was published by Jones and Bartlett Learning as a part of their Information Systems Security and Assurance Series. This series presents a comprehensive and consistent presentation of the most recent thinking and trends in this essential subject area. It is designed to be used in courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security. The essential information security principles covered in these publications are illustrated throughout using examples and applications drawn from the real world. They provide in-depth information on any and all aspects of information security, and their authors are Certified Information Systems Security Professionals (CISSPs). These publications are not only up to date, but also forward-thinking, as they have been word-for-word reviewed by leading technical experts in the area. As a result, they will put you in a position to tackle the cybersecurity concerns of not just today, but also tomorrow, as we go forward.