Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
 Search:   
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
 
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
I.T
 .NET
 Windows 8
 Adobe CS6
 Cisco
 CCNA 2012
 CCNP 2012
 Java
 VB
 ASP
 Web Design
 E-Commerce
 Project Management
 ITIL
 Macintosh
 Mobile Devices
 Linux
 Windows Server 2012
 SQL Server 2012
 SAP
Certification
 MCITP
 MCTS
Economics and Business
 Accounting
 Business Information Systems
 Economics
 Finance
 Management
 Marketing
 TAX
 Human Resources
Academic
 Law
 Nursing
 Medical
 Psychology
 Engineering

IT Governance: A Manager's Guide to Data Security and BS 7799/ISO 17799

by: Calder,Alan.|Watkins, Steve.

On-line Price: $70.00 (includes GST)

Paperback package 352

50%Off Retail Price

You save: $70.00

CLEARANCE Item - Special discount -limited stock
_____________________
N.Sydney : In Stock

Retail Price: $140.00

Publisher: Kogan Page Ltd,01.06.05

Category: COMPUTER SECURITY Level: B/I/A

ISBN: 0749443944
ISBN13: 9780749443948

Add to Shopping Cart

Description: The development of IT governance makes it essential for managers at all levels and in organizations of all sizes to understand how best to deal with information security risks. Also, the Turnbull report on company risk management (alongside laws and regulations throughout the OECD) gives company directors a legal responsibility to act on computer and information security. This book guides business managers through the issues involved in achieving ISO certification in Information Security Management and covers all aspects of data security.

Contents: Why is information security necessary? The Combined Code and the Turnbull Report. BS7799. Information security management. Information security policy and scope. The risk assessment and statement applicability. Security of third party access and outsourcing. Asset classification and control. Personnel security. Physical and environmental security. Equipment security. General security controls. Communications and operations management. Controls against malicious software. Housekeeping, network management and media handling. Exchanges of information and software. E-mail and Internet use. Access control. Network access control. Operating system access control. Application access control. Mobile computing and teleworking. Systems development and maintenance. Cryptographic controls. Security in development and support process. Business continuity management. Compliance. The BS7799 audit.