Security strategy : from requirements to reality /

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It cl...

Full description

Bibliographic Details
Main Authors: Stackpole, Bill., Oksendahl, Eric.
Format:
Language:eng
Published: Boca Raton, FL : CRC Press, 2011
Subjects:
_version_ 1796745504960282624
author Stackpole, Bill.
Oksendahl, Eric.
author_facet Stackpole, Bill.
Oksendahl, Eric.
author_sort Stackpole, Bill.
collection OCEAN
description Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. --
first_indexed 2024-03-05T12:41:36Z
format
id KOHA-OAI-TEST:483891
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T12:41:36Z
publishDate 2011
publisher Boca Raton, FL : CRC Press,
record_format dspace
spelling KOHA-OAI-TEST:4838912020-12-19T17:17:51ZSecurity strategy : from requirements to reality / Stackpole, Bill. Oksendahl, Eric. Boca Raton, FL : CRC Press,2011.engAddressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. --Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. --PSZKLLComputer security.Information technologyData protection.BusinessURN:ISBN:9781439827338 (pbk.)
spellingShingle Computer security.
Information technology
Data protection.
Business
Stackpole, Bill.
Oksendahl, Eric.
Security strategy : from requirements to reality /
title Security strategy : from requirements to reality /
title_full Security strategy : from requirements to reality /
title_fullStr Security strategy : from requirements to reality /
title_full_unstemmed Security strategy : from requirements to reality /
title_short Security strategy : from requirements to reality /
title_sort security strategy from requirements to reality
topic Computer security.
Information technology
Data protection.
Business
work_keys_str_mv AT stackpolebill securitystrategyfromrequirementstoreality
AT oksendahleric securitystrategyfromrequirementstoreality