Executive Guide


Book Description

Virtually all of the executive agencies have appointed Chief Information Officers (CIO), & many have taken positive steps toward the implementation of information management (IM) processes specified by law. To reap the full benefits of IM reform, Federal agencies must utilize the full potential of CIOs as IM leaders & participants in the development of agency strategic plans & policies. The CIOs must meet the challenge of building credible IM organizations, & developing & organizing IM capabilities to meet agency mission needs. This guide will assist Fed. agencies in maximizing the success of CIOs. Offers concrete suggestions on what agency executives can do to ensure the effectiveness of their CIO organizations.




Executive Guide


Book Description







Information Security Management Handbook, Sixth Edition


Book Description

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.










Privacy Handbook


Book Description

We don't have to tell you that keeping up with privacy guidelines and having a strong privacy policy are critical in today's network economy. More and more organizations are instating the position of a Corporate Privacy Officer (CPO) to oversee all of the privacy issues within and organization. The Corporate Privacy Handbook will provide you with a comprehensive reference on privacy guidelines and instruction on policy development/implementation to guide corporations in establishing a strong privacy policy. Order your copy today!




Information Security


Book Description

Assesses the current state of information security (IS) in the fed. gov't. It delineates the serious IS weaknesses that place critical operations and assets at risk and outlines actions needed to further improve security practices in gov't. Focuses on the Dept. of Vets. Affairs and the Social Security Admin., which illustrate the types of risk facing departments and agencies as well as actions required to strengthen security mgmt. Recent efforts by these org's. and others throughout gov't. are encouraging because they signify increasing attention to IS concerns, but additional measures are necessary to develop and maintain an effective IS mgmt. program.




High-risk Series


Book Description