Exercise Information Security

Principles of Information Security, 5th Edition  eBooks & eLearning

Posted by sasha82 at Jan. 18, 2017
Principles of Information Security, 5th Edition

Principles of Information Security, 5th Edition by Michael E. Whitman, Herbert J. Mattord
November 18, 2014 | ISBN: 1285448367 | English | 656 pages | PDF | 15 MB
Information Security Governance: A Practical Development and Implementation Approach(Repost)

Information Security Governance: A Practical Development and Implementation Approach by Krag Brotby
English | 2009 | ISBN: 0470131187 | 220 Pages | PDF | 3.04 MB

Wolves, Sheep, and Sheepdogs: A Leader's Guide to Information Security  eBooks & eLearning

Posted by AlenMiler at Jan. 15, 2017
Wolves, Sheep, and Sheepdogs: A Leader's Guide to Information Security

Wolves, Sheep, and Sheepdogs: A Leader's Guide to Information Security by Jim Shaeffer
English | 8 Jan. 2017 | ASIN: B01N4M9WJA | 62 Pages | AZW3/MOBI/EPUB/PDF (conv) | 3.7 MB

The angles of attack in today’s cyber security landscape evolve every moment. But even more ominous, there is no organization too small to escape being a target. However, there is an answer to these threats: a good sheepdog, alert to every danger and breach.
Practical Information Security Management: A Complete Guide to Planning and Implementation

Practical Information Security Management: A Complete Guide to Planning and Implementation by TONY CAMPBELL
2016 | ISBN: 1484216849 | English | 237 pages | PDF | 9 MB
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement (repost)

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement by W. Krag Brotby CISM
English | 2009 | ISBN: 1420052853 | 200 pages | PDF | 11,6 MB
Information Security Evaluation: A Holistic Approach from a Business Perspective (Repost)

Igli Tashi, Solange Ghernaouti-Helie, "Information Security Evaluation: A Holistic Approach from a Business Perspective"
English | ISBN: 143987915X | 2011 | 300 pages | PDF | 13 MB
Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS... (repost)

Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 by Barry L. Williams
English | 2013 | ISBN: 1466580585 | 152 pages | PDF | 3 MB
Information Security Policies, Procedures, and Standards: A Practitioner's Reference

Information Security Policies, Procedures, and Standards: A Practitioner's Reference by Douglas J. Landoll
English | 2016 | ISBN: 1482245892 | 254 pages | PDF | 5 MB

The Information Security Big Picture (2016)  eBooks & eLearning

Posted by naag at Nov. 26, 2016
The Information Security Big Picture (2016)

The Information Security Big Picture
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 307 MB
Genre: eLearning | Language: English

Information security is an increasingly critical part of life, yet it can be a struggle to keep the hackers at bay. This course tackles some common misunderstandings and gets straight to the heart of what's essential to know about infosec today.

Coursera - Information Security and Risk Management in Context [repost]  eBooks & eLearning

Posted by ParRus at Nov. 20, 2016
Coursera - Information Security and Risk Management in Context [repost]

Coursera - Information Security and Risk Management in Context
University of Washington with Barbara Endicott-Popovsky

WEBRip | English | MP4 | 960 x 540 | AVC ~456 kbps | 29.970 fps
AAC | 128 Kbps | 44.1 KHz | 2 channels | Subs: English (.srt) | 16:43:29 | 2.54 GB
Genre: eLearning Video / Information Technology, Security

Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Discover how to foster the development of future information security leaders.