Cargando…

Building a practical information security program /

Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Andress, Jason (Autor), Leary, Mark (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress, ©2017.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn960280790
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 161011s2017 mau ob 001 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d N$T  |d IDEBK  |d TEFOD  |d N$T  |d OPELS  |d N$T  |d OCLCF  |d GGVRL  |d OCLCQ  |d OCLCO  |d UPM  |d OCLCQ  |d OTZ  |d CNCGM  |d VGM  |d OCLCQ  |d U3W  |d OCLCA  |d D6H  |d OCLCQ  |d WYU  |d UKAHL  |d S2H  |d OCLCO  |d OCLCQ  |d PSYSI  |d OCLCQ  |d OCLCO 
019 |a 960492646  |a 964536772 
020 |a 9780128020883  |q (electronic bk.) 
020 |a 0128020881  |q (electronic bk.) 
020 |z 9780128020425 
020 |z 0128020423 
029 1 |a AU@  |b 000059476709 
029 1 |a CHNEW  |b 001013866 
029 1 |a DEBSZ  |b 482474459 
029 1 |a GBVCP  |b 879417862 
035 |a (OCoLC)960280790  |z (OCoLC)960492646  |z (OCoLC)964536772 
037 |a B6A1091A-BF9A-4704-9DE5-FFC33A2B5EF9  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Andress, Jason,  |e author. 
245 1 0 |a Building a practical information security program /  |c Jason Andress, CISSP, ISSAP, CISM, GPEN, Mark Leary, CISSP, CISM, CGIET, PMP. 
260 |a Cambridge, MA :  |b Syngress,  |c ©2017. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics. 
520 |a Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information storage and retrieval systems  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Systèmes d'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Information storage and retrieval systems  |x Security measures  |2 fast 
700 1 |a Leary, Mark,  |e author. 
776 0 8 |i Print version:  |z 9780128020425  |z 0128020423  |w (OCoLC)895731255 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1151431  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26936253 
938 |a EBSCOhost  |b EBSC  |n 1151431 
938 |a Gale Cengage Learning  |b GVRL  |n GVRL9JSK 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis36496132 
938 |a YBP Library Services  |b YANK  |n 13211073 
994 |a 92  |b IZTAP