Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization.
“Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this publication, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.
Lulu Staff has been notified of a possible violation of the terms of our Membership Agreement. Our agents will determine if the content reported is inappropriate or not based on the guidelines provided and will then take action where needed.
Thank you for notifying us. We will email you with the results and/or actions taken as a result of the investigation if you chose to receive confirmation.