This comprehensive guide to information security and privacy training provides a start to finish program for information technology security managers, chief information officers, and security
trainers, on the design, creation, implementation and assessment of security and privacy programs. Herold, a well regarded security expert and consultant, discusses all facets of information
security planning and training, from the governmental regulations that inform the process, to training methods, communications techniques and evaluations. The volume includes specific training
examples, case studies and twenty-two appendices providing sample forms, worksheets, activities, testing material, and slide show examples, among a large variety of other resources. Annotation
穢2010 Book News, Inc., Portland, OR (booknews.com)