|Information security analytics: finding security insights, patterns, and anomalies in big data
By Mark Talabis.
E Book, Online
|Information assurance handbook : effective computer security and risk management strategies
By Corey Schou, Steven Hernandez.
TK5105.59.S376, Lee Wee Nam Library
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems
[As taken from Amazon]
|Security policies and implementation issues
By Rob Johnson.
QA76.9.A25J68 2015, Lee Wee Nam Library
The book offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by an industry expert, it presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. [As taken from Amazon]
|Building an information security awareness program : defending against social engineering and technical threats
By Bill Gardner, Valerie Thomas.
TK5102.85.G226, Lee Wee Nam Library
Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. [As taken from Amazon]
|Introduction to information security : a strategic-based approach
TK5102.85.S556, Lee Wee Nam Library
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. [As taken from Amazon]