TESTIMONIALS

“Received the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.”

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY

Introduction to Information Security: A Strategic Based Approach

by Mark Rowe

Author: Timothy Shimeall and Jonathan Spring

ISBN No:

Review date: 16/12/2025

No of pages:

Publisher: Syngress

Publisher URL:
http://scitechconnect.elsevier.com

Year of publication: 01/11/2013

Brief:

Introduction to Information Security

Introduction to Information Security: A Strategic Based Approach by Timothy Shimeall and Jonathan Spring, published by Elsevier Science and Technology Books.

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, this book gives the reader a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline.

Also available are:

FISMA Compliance Handbook by Laura Taylor

This book instructs IT managers in adhering to federally mandated compliance requirements. It explains the requirements for FISMA compliance and why it is mandated by federal law. The evolution of Certification and Accreditation is also discussed. This book walks the reader through the entire FISMA compliance process including how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and information on how to conduct a FISMA compliant security assessment. This second edition includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.

Risk Management Framework: A Lab-Based Approach to Securing Information Systems by James Broad

With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of the RMF process, guidance is needed to help individuals implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.