Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
84 ◾  Information Security Management Handbook
Iterate to Dominate
e process of successive improvements over time is extremely powerful. is is the same basic
approach that underlies evolution, Agile software development, and the business strategy of
Kaizen. e basic structure of these processes is to take an initial state and improve it in successive
generations based on feedback, prioritizing improvements where they are most needed. e same
concept can be applied to an information security program.
e goal here is to have good security across the board. Do not put in Fort Knox security
in one area and none in another. Instead, get them all ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498