Cargando…

Information security evaluation : a holistic approach /

Information systems have become a critical element of every organization's structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the other hand, modern businesses and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Tashi, Igli
Otros Autores: Ghernaouti-Hélie, Solange
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Lausanne, Switzerland : EPFL, [2011]
Colección:Management of technology series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn874163089
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 140227t20112011sz a ob 000 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d STF  |d YDXCP  |d VLB  |d OCLCF  |d EBLCP  |d N$T  |d CRCPR  |d DEBSZ  |d OCLCQ  |d MERUC  |d UAB  |d OCLCQ  |d CEF  |d OCLCQ  |d NLE  |d OCLCQ  |d UKMGB  |d OTZ  |d WYU  |d UWO  |d YDX  |d TYFRS  |d OCLCQ  |d LEAUB  |d AU@  |d OCLCQ  |d NLW  |d OCLCQ  |d VT2  |d ELBRO  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCL 
016 7 |a 018381795  |2 Uk 
019 |a 870716536  |a 870946854 
020 |a 9781439879160  |q (e-book) 
020 |a 1439879168  |q (e-book) 
020 |z 9781439879153 
020 |z 9782940222537  |q (EPFL Press) 
020 |z 2940222533  |q (EPFL Press) 
020 |z 143987915X  |q (CRC Press) 
029 1 |a AU@  |b 000052911500 
029 1 |a CHNEW  |b 000690475 
029 1 |a CHNEW  |b 000690477 
029 1 |a DEBSZ  |b 431616523 
029 1 |a DEBSZ  |b 463016513 
029 1 |a NZ1  |b 15585528 
029 1 |a UKMGB  |b 018381795 
035 |a (OCoLC)874163089  |z (OCoLC)870716536  |z (OCoLC)870946854 
037 |a TANDF_242466  |b Ingram Content Group 
050 4 |a QA76.9.A25  |b T37 2011eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.472  |2 23 
049 |a UAMI 
100 1 |a Tashi, Igli. 
245 1 0 |a Information security evaluation :  |b a holistic approach /  |c Igli Tashi and Solange Ghernaouti-Hélie. 
264 1 |a Lausanne, Switzerland :  |b EPFL,  |c [2011] 
264 4 |c ©20 
264 4 |c ©2011 
300 |a 1 online resource (212 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Management of technology series 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from PDF title page (ebrary, viewed March 7, 2014). 
505 0 |a Chapter 1. What is information security? -- chapter 2. Risk management versus security management -- chapter 3. Information security assurance : an assessment model -- chapter 4. Evaluating the organizational dimension -- chapter 5. Evaluating the functional dimension -- chapter 6. Evaluating the human dimension -- chapter 7. Evaluating the compliance dimension -- chapter 8. Concluding remarks. 
520 |a Information systems have become a critical element of every organization's structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the other hand, modern businesses and organizations collaborate increasingly with companies, customers, and other stakeholders by technological means. This emphasizes the need for a reliable and secure ICT infrastructure for companies whose principal asset and added value is information. Information Security Evaluation: A Ho. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Business intelligence. 
650 0 |a Confidential business information. 
650 6 |a Renseignements commerciaux confidentiels. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Business intelligence  |2 fast 
650 7 |a Confidential business information  |2 fast 
700 1 |a Ghernaouti-Hélie, Solange. 
758 |i has work:  |a Information Security Evaluation (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYHbC78rCKwVGKTJcGq7tq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Tashi, Igli.  |t Information security evaluation.  |b 1st ed.  |d Lausanne, Switzerland : EPFL Press, ©2011  |z 9782940222537  |w (OCoLC)777274167 
830 0 |a Management of technology series. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1605622  |z Texto completo 
936 |a BATCHLOAD 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1605622 
938 |a ebrary  |b EBRY  |n ebr10839552 
938 |a EBSCOhost  |b EBSC  |n 706712 
938 |a eLibro  |b ELBO  |n ELB144456 
938 |a Taylor & Francis  |b TAFR  |n EFP0NE10557PDF 
938 |a Taylor & Francis  |b TAFR  |n 9780429109140 
938 |a YBP Library Services  |b YANK  |n 15918330 
938 |a YBP Library Services  |b YANK  |n 11616212 
994 |a 92  |b IZTAP