|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn960280790 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
161011s2017 mau ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e pn
|c YDX
|d N$T
|d IDEBK
|d TEFOD
|d N$T
|d OPELS
|d N$T
|d OCLCF
|d GGVRL
|d OCLCQ
|d OCLCO
|d UPM
|d OCLCQ
|d OTZ
|d CNCGM
|d VGM
|d OCLCQ
|d U3W
|d OCLCA
|d D6H
|d OCLCQ
|d WYU
|d UKAHL
|d S2H
|d OCLCO
|d OCLCQ
|d PSYSI
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 960492646
|a 964536772
|
020 |
|
|
|a 9780128020883
|q (electronic bk.)
|
020 |
|
|
|a 0128020881
|q (electronic bk.)
|
020 |
|
|
|z 9780128020425
|
020 |
|
|
|z 0128020423
|
029 |
1 |
|
|a AU@
|b 000059476709
|
029 |
1 |
|
|a CHNEW
|b 001013866
|
029 |
1 |
|
|a DEBSZ
|b 482474459
|
029 |
1 |
|
|a GBVCP
|b 879417862
|
035 |
|
|
|a (OCoLC)960280790
|z (OCoLC)960492646
|z (OCoLC)964536772
|
037 |
|
|
|a B6A1091A-BF9A-4704-9DE5-FFC33A2B5EF9
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Andress, Jason,
|e author.
|
245 |
1 |
0 |
|a Building a practical information security program /
|c Jason Andress, CISSP, ISSAP, CISM, GPEN, Mark Leary, CISSP, CISM, CGIET, PMP.
|
260 |
|
|
|a Cambridge, MA :
|b Syngress,
|c ©2017.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Chapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.
|
520 |
|
|
|a Demonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information storage and retrieval systems
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Systèmes d'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Information storage and retrieval systems
|x Security measures
|2 fast
|
700 |
1 |
|
|a Leary, Mark,
|e author.
|
776 |
0 |
8 |
|i Print version:
|z 9780128020425
|z 0128020423
|w (OCoLC)895731255
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1151431
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26936253
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1151431
|
938 |
|
|
|a Gale Cengage Learning
|b GVRL
|n GVRL9JSK
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis36496132
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13211073
|
994 |
|
|
|a 92
|b IZTAP
|