Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Information Security Governance Simplified: From the Boardroom to the Keyboard
Top Free Unix/Linux Books 🌠 - 100% Free or Open Source!
  • Title: Information Security Governance Simplified: From the Boardroom to the Keyboard
  • Author(s) Todd Fitzgerald
  • Publisher: CRC Press; 1st edition (September 30, 2020); eBook (Creative Commons Licensed)
  • License(s): Creative Commons License (CC)
  • Hardcover/Paperback: 431 pages
  • eBook: PDF and Read Online
  • Language: English
  • ISBN-10/ASIN: 0367659220
  • ISBN-13: 978-0367659226
  • Share This:  

Book Description

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. This book lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.

About the Authors
  • Todd Fitzgerald, CISSP, CISA, CISM, CIPM, CIPP/US, CIPP/E, CIPP/C, CGEIT, CRISC, PMP, ISO27000, and ITILv3 certified, is Managing Director and CISO of CISO Spotlight, LLC.
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Information Security Management: An Executive View

    This book helps enable companies to understand and manage privacy and cyber risks to build business trust. It serves as a reference for professionals who currently work in the labor market.

  • CompTIA Security+ Study Guide (Netwrix)

    This book is designed for IT and security professionals who aim to obtain CompTIA Security+ certification. It covers all the certification exam objectives (domains) of the latest version of the exam, Sy0-501.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Defense against the Black Arts: How Hackers Do What They Do?

    The best way to secure a system is to understand the tools hackers use and know how to circumvent them. This book provides hands-on instruction to a host of techniques used to hack into a variety of systems.

  • Data Privacy for the Smart Grid (Rebecca Herold, et al)

    This book provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies.

  • Computer Security Handbook (Seymour Bosworth, et al.)

    This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.

  • Hacking Street: The Way of Hacking (Kirandeep Singh Sandhu)

    Focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware.

  • Hacking: The Art of Exploitation (Jon Erickson)

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Few 'Hackers' have the strong technical foundation needed to really push the envelope.

  • Unauthorized Access: The Crisis in Online Privacy and Security

    Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security.

  • The Hacker's Underground Handbook (David Melnichuk)

    This book will put you into a hacker's mindset and teach you all of the hacker's secret ways. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware.

  • Learn Ethical Hacking from Scratch (Zaid Sabih)

    You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices.

  • A Beginner's Guide to Understanding Game Hacking Techniques

    Game hacking allows you to add functionality and change how games work. Whether your goal is to add a new unit to an RTS game or create an aimbot for a FPS game, this book will teach you what you need to become a true game hacker.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Rational Cybersecurity for Business (Daniel Blum)

    This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.

  • Security of Ubiquitous Computing Systems (Gildas Avoine, et al)

    It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.

  • Handbook of Information Security Management (Micki Krause)

    Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

  • Open Source Security Tools: A Practical Guide to Security Apps

    This book is a practical, hands-on introduction to open source security tools. It reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.

Book Categories
:
Other Categories
Resources and Links