?
Solved

Need books or online materials to plan a security strategy.

Posted on 2003-11-02
2
Medium Priority
?
245 Views
Last Modified: 2010-04-11
I'm looking for books, online materials whatever that will help define a security strategy for more company. Information must be somewhat broad and easy to read but aid me in creating an overall plan. My company is separated geographically with in a small area and several public use labs. We have close to 1200 pcs. Like a small college.
0
Comment
Question by:Fubyou
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 500 total points
ID: 9669313
http://www.amazon.com/exec/obidos/tg/detail/-/0072224630/qid=1067845858/sr=8-1/ref=sr_8_1/103-2517120-6504666?v=glance&n=507846

Create and implement a successful security and disaster recovery program. Recognize potential vulnerabilities in your current system.
This guide provides you with a roadmap for developing an end-to-end security program. You'll discover methods for proactively protecting your network before a security breach occurs. Covering the earliest phases of plan development, team organization and training, to technology deployment and incident recovery strategies, this book combines conceptual explanations with checklists at the end of every chapter. Understand the laws and regulations affecting information security programs; Deploy new projects and technologies in a cost-effective manner; Define requirements and establish policies and procedures for your organization; Respond to incidents and disasters in a systematic fashion to minimize loss or damage to valuable data; Learn to identify, hire - and keep - security professionals and establish the reporting structure for the information security department; Introduce human controls, including staff awareness, to help improve security; Discover how audits and penetration tests can help in assessing risk; Assemble an incident response team and set priorities and goals for each member.

0
 

Author Comment

by:Fubyou
ID: 9672804
good and I can download it in adobe acrobat also!!!
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question