{"id":19067,"date":"2023-07-04T14:00:03","date_gmt":"2023-07-04T17:00:03","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=19067"},"modified":"2023-07-04T13:38:07","modified_gmt":"2023-07-04T16:38:07","slug":"information-security-management-an-executive-view","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/information-security-management-an-executive-view\/","title":{"rendered":"Information Security Management &#8211; An Executive View"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-19068\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2023\/07\/information-security-management-an-executive-view.jpg\" alt=\"Information Security Management - An Executive View\" width=\"145\" height=\"208\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2023\/07\/information-security-management-an-executive-view.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2023\/07\/information-security-management-an-executive-view-105x150.jpg 105w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Marcos S\u00eamola<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Information Security Management has long ceased to be a subject restricted to technology and has become a mandatory topic on the agenda of executives C-Level in Board of Directors meetings as a critical factor of success and survival for any business. Faced with this challenge, the author, who has dedicates more than three decades to the subject, shows in this book in a logical, didactic and direct way how risk management must be effectively elaborated in the adoption of personalized and integrated physical, technological and human controls that enable the risk reduction and management, leading companies to operate at a level of security adequate to the business appetite. This new translated edition of Information Security Management not only answers questions about why, when, where, what and how to plan an information security program, but also provides insights and useful tools for professionals involved directly or indirectly with the management of information assets and to all persons who hold information.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2023\/07\/information-security-management-an-executive-view.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Marcos S\u00eamola R\u00e9sum\u00e9: Information Security Management has long ceased to be a subject restricted to technology and has become a mandatory topic on the agenda of executives C-Level in Board of Directors meetings as a critical factor of success and survival for any business. Faced with this challenge, the author, who has dedicates more than three decades to the subject, shows in this book in a logical, didactic and direct&hellip; <\/p>\n","protected":false},"author":3,"featured_media":19068,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,112],"tags":[],"class_list":["post-19067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-download"],"views":141,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/19067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=19067"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/19067\/revisions"}],"predecessor-version":[{"id":19069,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/19067\/revisions\/19069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/19068"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=19067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=19067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=19067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}