{"id":21000,"date":"2025-10-14T14:00:13","date_gmt":"2025-10-14T17:00:13","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/?p=21000"},"modified":"2025-10-14T12:56:07","modified_gmt":"2025-10-14T15:56:07","slug":"security-policies-and-implementation-issues","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/livros\/security-policies-and-implementation-issues\/","title":{"rendered":"Security Policies and Implementation Issues"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-21001\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/10\/security-policies-and-implementation-issues.jpg\" alt=\"Security Policies and Implementation Issues\" width=\"145\" height=\"179\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/10\/security-policies-and-implementation-issues.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/10\/security-policies-and-implementation-issues-122x150.jpg 122w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Robert Johnson, Chuck Easttom<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Publisher Jones &amp; Bartlett Learning<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Overview:<\/strong><\/span> Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Robert Johnson, Chuck Easttom Publisher Jones &amp; Bartlett Learning Overview: Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms&hellip; <\/p>\n","protected":false},"author":3,"featured_media":21001,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,51,23],"tags":[],"class_list":["post-21000","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-livros","category-english","category-enterprise-security-management"],"views":283,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/21000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/comments?post=21000"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/21000\/revisions"}],"predecessor-version":[{"id":21002,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/21000\/revisions\/21002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media\/21001"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media?parent=21000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/categories?post=21000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/tags?post=21000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}