Purser, Steve2018-11-142018-11-1420042004http://196.43.179.3:8080/xmlui/handle/123456789/10711.The need for a proactive approach; 2.Management techniques; 3.Technical tools; 4.A proactive approach: Overview; 5.The information-security strategy; 6..Policy and standards; 7.Process design and implementation; 8.Building an IT security architecture; 9.Creating a security-minded cultureen-USApractical guide to managing information securityBook