Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
 Windows 8
 Adobe CS6
 CCNA 2012
 CCNP 2012
 Web Design
 Project Management
 Mobile Devices
 Windows Server 2012
 SQL Server 2012
Economics and Business
 Business Information Systems
 Human Resources

IT Governance: A Manager's Guide to Data Security and BS 7799/ISO 17799

by: Calder,Alan.|Watkins, Steve.

On-line Price: $70.00 (includes GST)

Paperback package 352

50%Off Retail Price

You save: $70.00

CLEARANCE Item - Special discount - limited stock!
N.Sydney : In Stock

Retail Price: $140.00

Publisher: Kogan Page Ltd,01.06.05


ISBN: 0749443944
ISBN13: 9780749443948

Add to Shopping Cart

Description: The development of IT governance makes it essential for managers at all levels and in organizations of all sizes to understand how best to deal with information security risks. Also, the Turnbull report on company risk management (alongside laws and regulations throughout the OECD) gives company directors a legal responsibility to act on computer and information security. This book guides business managers through the issues involved in achieving ISO certification in Information Security Management and covers all aspects of data security.

Contents: Why is information security necessary? The Combined Code and the Turnbull Report. BS7799. Information security management. Information security policy and scope. The risk assessment and statement applicability. Security of third party access and outsourcing. Asset classification and control. Personnel security. Physical and environmental security. Equipment security. General security controls. Communications and operations management. Controls against malicious software. Housekeeping, network management and media handling. Exchanges of information and software. E-mail and Internet use. Access control. Network access control. Operating system access control. Application access control. Mobile computing and teleworking. Systems development and maintenance. Cryptographic controls. Security in development and support process. Business continuity management. Compliance. The BS7799 audit.