Security strategy : from requirements to reality /
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It cl...
Main Authors: | Stackpole, Bill., Oksendahl, Eric. |
---|---|
Format: | |
Language: | eng |
Published: |
Boca Raton, FL : CRC Press,
2011
|
Subjects: |
Similar Items
-
Advances in enterprise information technology security /
by: Khadraoui, Djamel, et al.
Published: (2007) -
CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives /
by: 334259 Collette, Ronald D., et al.
Published: (2009) -
Information security management metrics : a definitive guide to effective security monitoring and measurement /
by: 445734 Brotby, W. Krag
Published: (2009) -
Information technology security /
by: Siti Rahayu Selamat
Published: (2006) -
Cyber security policy guidebook /
by: Bayuk, Jennifer L.
Published: (2012)