CHAPTER 6 IT Security Policy Frameworks
CHAPTER 7 How to Design, Organize, Implement, and Maintain IT Security Policies
CHAPTER 8 IT Security Policy Framework Approaches
CHAPTER 9 User Domain Policies
CHAPTER 10 IT Infrastructure Security Policies
CHAPTER 11 Data Classification and Handling Policies and Risk Management Policies