Cargando…

Information security management : concepts and practice /

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Raggad, Bel G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press/Taylor & Francis, ©2010.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn779881808
003 OCoLC
005 20240329122006.0
006 m o d
007 cr un|||||||||
008 120212s2010 flua ob 001 0 eng d
040 |a B24X7  |b eng  |e pn  |c B24X7  |d GZM  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d CRCPR  |d LIV  |d OCLCA  |d COO  |d UKMGB  |d UWO  |d YDX  |d BRF  |d ELBRO  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
015 |a GBB7B0197  |2 bnb 
016 7 |a 018393067  |2 Uk 
020 |z 9781420078541  |q (hardcover ;  |q alk. paper) 
020 |z 1420078542  |q (hardcover ;  |q alk. paper) 
020 |a 9781439882634 
020 |a 1439882630 
029 1 |a AU@  |b 000053278335 
029 1 |a UKMGB  |b 018393067 
029 1 |a AU@  |b 000070359505 
035 |a (OCoLC)779881808 
037 |a TANDF_246580  |b Ingram Content Group 
050 4 |a QA76.9.A25  |b R337 2010eb 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Raggad, Bel G. 
245 1 0 |a Information security management :  |b concepts and practice /  |c Bel G. Raggad. 
260 |a Boca Raton, FL :  |b CRC Press/Taylor & Francis,  |c ©2010. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from title screen (Books24x7, viewed Apr. 26, 2012). 
505 0 |a Part SECTION I: INTRODUCTION -- chapter 1 Introduction to Information Security Management -- chapter 2 Introduction to Management Concepts -- chapter 3 The Information Security Life Cycle -- part SECTION II: SECURITY PLAN -- chapter 4 Security Plan -- chapter 5 Security Policy -- chapter 6 Business Continuity Planning -- part SECTION III: SECURITY ANALYSIS -- chapter 7 Security Risk Management -- chapter 8 Continual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR) -- chapter 9 Active Security Assessment -- chapter 10 System Availability -- part SECTION IV: SECURITY DESIGN -- chapter 11 Nominal Security Enhancement Design Based on ISO/IEC 27002 -- chapter 12 Technical Security Enhancement Based on ISO/IEC 27001 -- part SECTION V: SECURITY IMPLEMENTATION -- chapter 13 Security Solutions -- chapter 14 The Common Criteria -- part SECTION VI: SECURITY REVIEW -- chapter 15 Security Review through Security Audit -- chapter 16 Privacy Rights, Information Technology, and HIPAA -- part SECTION VII: CONTINUAL SECURITY -- chapter 17 The Sarbanes{u2013}Oxley Act and IT Compliance -- chapter 18 Cyberterrorism and Homeland Security. 
520 3 |a Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a BUSINESS & ECONOMICS / Information Management.  |2 bisacsh 
650 7 |a COMPUTERS / Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
758 |i has work:  |a Information security management (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG7gydTMg7MDB7JRCfHGf3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Raggad, Bel G.  |t Information security management.  |d Boca Raton, FL : CRC Press/Taylor & Francis, ©2010  |z 9781420078541  |w (DLC) 2009043226  |w (OCoLC)226357396 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1449482  |z Texto completo 
938 |a eLibro  |b ELBO  |n ELB145266 
938 |a YBP Library Services  |b YANK  |n 15918500 
938 |a Books 24x7  |b B247  |n bks00032097 
938 |a CRC Press  |b CRCP  |n 9781439882634 
994 |a 92  |b IZTAP