Contains ready to use Security policies and procedures. The book lays out in a comprehensive way an organization wide process to develop a secure information structure. The insights range from high level strategies, to lower level tactics, with a few verypractical examples thrown in here and there. Information security should be a critical concern of today"s high-tech organizations. But so often it is forgotten, or relegated into obscurity because there was too much (or not enough) process or the securty was too intrusive. The book strikes a good, pragmatic balance between convenience and security here. No company these days can afford to ignore the topic of information security, be it computers or just customer information. This book covers a proces approach to Manage Information Security Threats, Challenges, and Solutions. One of the things you will like about this book is its practicality. Because everything ties back into "what do you need to do", there isn"t much filler material hanging aroud. It is also pragmatic. Rather than declare that the sky is falling unless you obtain a perfect score, this book guides you to understand that every organization is in a different spot. You just evaluate where you are right now, note the deficiencies, deermine where you need to be, and then make plans to get there. Definitely good reading for all managers and above at any organization. By reading this book now and taking steps today, you can avoid major trouble down the road... Это и многое другое вы найдете в книге Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Pr (Gerard Blokdijk, Ivanka Menken)