Get Free Shipping on orders over $79
Building a Comprehensive IT Security Program : Practical Guidelines and Best Practices - Jeremy Wittkop

Building a Comprehensive IT Security Program

Practical Guidelines and Best Practices

By: Jeremy Wittkop

Paperback | 28 July 2016

At a Glance

Paperback


RRP $84.99

$84.75

or 4 interest-free payments of $21.19 with

 or 

Ships in 10 to 15 business days

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.

Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.

Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.

Jeremy Wittkop's security expertise and critical experience provides insights into topics such as:

  • Who is attempting to steal information and why?
  • What are critical information assets?
  • How are effective programs built?
  • How is stolen information capitalized?
  • How do we shift the paradigm to better protect our organizations?
  • How we can make the cyber world safer for everyone to do business?
Industry Reviews
"This is an excellent book that covers all of the relevant topics needed for implementing a successful security program. The author clearly understands both security and business issues and explains the need for senior management involvement and how a security process must complement the overall business process. ... The writing is clear and readable for nontechnical people. I highly recommend it to anyone interested in cyber security." (Computing Reviews, May, 2017)

More in Algorithms & Data Structures

Addiction by Design : Machine Gambling in Las Vegas - Natasha Dow Schll
Python for Algorithmic Trading : From Idea to Cloud Deployment - Yves Hilpisch
Learning Spark : Lightning-Fast Data Analytics - Brooke Wenig

RRP $152.00

$73.75

51%
OFF
New Storytelling : Learning through Metaphors - Anna Ursyn

RRP $103.00

$91.75

11%
OFF
Uncertain Data Analysis : Fuzzy Vector Algorithms - Sansanee Auephanwiriyakul
Uncertain Data Analysis : Fuzzy Vector Algorithms - Sansanee Auephanwiriyakul

RRP $94.99

$85.75

10%
OFF
Applied Data Science in FinTech : Models, Tools, and Case Studies - Juraj Hric