Information Security Solutions for The Digital World
Global Information Risk Management (IRM) company Announces Partnership with Exafort to Offer Information Security and Risk Management Services
Information Security- Benefits of Information Security Services
Information Security - Need for Efficient Information Security Solutions
Cigital CTO Dr. Gary McGraw to Lead IEEE Security & Privacy Magazine
Experts views on CALEA Extensions - IEEE Security & Privacy Magazine
Information Security Standards
Information Security Management System ISO 27001:2005
Open-source FTP Application Compromised. Information Security Experts Analyze the Vulnerability
Rise in Number of Hacking Attacks in China pose challenge for Information Security Experts
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:
Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.
Use coupon below to get discount at eCampus.com!
$3 off textbook orders over $75
$4 off textbook orders over $90
$5 off textbook orders over $100
Copy the coupon code before clicking the button!
|Amazon US||Paperback||$65.51 - $79.95|
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps ...
This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009.The 29 revised ...
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.The 33 revised full ...
This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full ...
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.The 7 revised full papers and 3 revised short papers ...
This book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007, held in Townsville, Australia in July 2007.The 33 revised full ...
This guide goes step-by-step through the methodology for developing, distributing and monitoring an information security awareness program. It includes instructions on what media to use and where to ...
Appin Information Security and Ethical Hacking "The Hackers Perspective Reloaded" "Global Leaders in Information Security and Ethical Hacking" One of the most Innovative Learning ...
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 ...
This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999. The 20 ...