Security strategy : from requirements to reality /
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It cl...
Main Authors: | , |
---|---|
Format: | |
Language: | eng |
Published: |
Boca Raton, FL : CRC Press,
2011
|
Subjects: |
_version_ | 1796745504960282624 |
---|---|
author | Stackpole, Bill. Oksendahl, Eric. |
author_facet | Stackpole, Bill. Oksendahl, Eric. |
author_sort | Stackpole, Bill. |
collection | OCEAN |
description | Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. -- |
first_indexed | 2024-03-05T12:41:36Z |
format | |
id | KOHA-OAI-TEST:483891 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T12:41:36Z |
publishDate | 2011 |
publisher | Boca Raton, FL : CRC Press, |
record_format | dspace |
spelling | KOHA-OAI-TEST:4838912020-12-19T17:17:51ZSecurity strategy : from requirements to reality / Stackpole, Bill. Oksendahl, Eric. Boca Raton, FL : CRC Press,2011.engAddressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. --Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. --PSZKLLComputer security.Information technologyData protection.BusinessURN:ISBN:9781439827338 (pbk.) |
spellingShingle | Computer security. Information technology Data protection. Business Stackpole, Bill. Oksendahl, Eric. Security strategy : from requirements to reality / |
title | Security strategy : from requirements to reality / |
title_full | Security strategy : from requirements to reality / |
title_fullStr | Security strategy : from requirements to reality / |
title_full_unstemmed | Security strategy : from requirements to reality / |
title_short | Security strategy : from requirements to reality / |
title_sort | security strategy from requirements to reality |
topic | Computer security. Information technology Data protection. Business |
work_keys_str_mv | AT stackpolebill securitystrategyfromrequirementstoreality AT oksendahleric securitystrategyfromrequirementstoreality |