|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
JSTOR_ocn609859930 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr n||---||||| |
008 |
100427s2010 enka ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d COCUF
|d STF
|d IDEBK
|d UMI
|d HNK
|d CEF
|d OCLCQ
|d N$T
|d B24X7
|d DEBSZ
|d ALAUL
|d OCLCQ
|d OCLCO
|d OCLCF
|d JSTOR
|d OCLCQ
|d YDXCP
|d E7B
|d OCLCQ
|d COO
|d OCLCQ
|d AGLDB
|d Z5A
|d MOR
|d PIFAG
|d ZCU
|d LIV
|d MERUC
|d OCLCQ
|d JBG
|d OCLCQ
|d IOG
|d U3W
|d OCLCA
|d EZ9
|d LND
|d WRM
|d VTS
|d ICG
|d INT
|d VT2
|d AU@
|d OCLCQ
|d LVT
|d OCLCQ
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d MM9
|d UKCRE
|d UX1
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 679602779
|a 704517560
|a 764547911
|a 888959440
|a 961502532
|a 962570608
|a 988411038
|a 992038506
|a 1037938816
|a 1038394763
|a 1055355094
|a 1058129766
|a 1081284975
|a 1103277653
|a 1129345663
|a 1153021757
|a 1175632903
|a 1181907231
|a 1192352031
|a 1240521098
|
020 |
|
|
|a 9781849280365
|q (electronic bk.)
|
020 |
|
|
|a 1849280363
|q (electronic bk.)
|
020 |
|
|
|z 9781849280358
|q (Paper)
|
020 |
|
|
|z 1849280355
|q (Paper)
|
029 |
1 |
|
|a AU@
|b 000051349011
|
029 |
1 |
|
|a CHNEW
|b 000605551
|
029 |
1 |
|
|a DEBBG
|b BV043085754
|
029 |
1 |
|
|a DEBBG
|b BV044142742
|
029 |
1 |
|
|a DEBSZ
|b 355450003
|
029 |
1 |
|
|a DEBSZ
|b 37279890X
|
029 |
1 |
|
|a DEBSZ
|b 396352650
|
029 |
1 |
|
|a DEBSZ
|b 42152961X
|
029 |
1 |
|
|a HEBIS
|b 291519903
|
029 |
1 |
|
|a NZ1
|b 13869759
|
029 |
1 |
|
|a NZ1
|b 15697127
|
029 |
1 |
|
|a AU@
|b 000053260229
|
029 |
1 |
|
|a AU@
|b 000068791378
|
035 |
|
|
|a (OCoLC)609859930
|z (OCoLC)679602779
|z (OCoLC)704517560
|z (OCoLC)764547911
|z (OCoLC)888959440
|z (OCoLC)961502532
|z (OCoLC)962570608
|z (OCoLC)988411038
|z (OCoLC)992038506
|z (OCoLC)1037938816
|z (OCoLC)1038394763
|z (OCoLC)1055355094
|z (OCoLC)1058129766
|z (OCoLC)1081284975
|z (OCoLC)1103277653
|z (OCoLC)1129345663
|z (OCoLC)1153021757
|z (OCoLC)1175632903
|z (OCoLC)1181907231
|z (OCoLC)1192352031
|z (OCoLC)1240521098
|
037 |
|
|
|a CL0500000077
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5g03
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b V53 2010eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM043050
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Vladimirov, Andrew A.
|
245 |
1 |
0 |
|a Assessing information security :
|b strategies, tactics, logic and framework /
|c A. Vladimirov, K. Gavrilenko, A. Michajlowski.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2010.
|
300 |
|
|
|a 1 online resource (405 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing, governance, policies and compliance -- Ch. 3. Security assessments classification -- Ch. 4. Advanced pre-assessment planning -- Ch. 5. Security audit strategies and tactics -- Ch. 6. Synthetic evaluation of risks -- Ch. 7. Presenting the outcome and follow-up acts -- Ch. 8. Reviewing security assessment failures and auditor management strategies.
|
520 |
|
|
|a This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.
|
506 |
|
|
|a Electronic resource (access conditions).
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer security
|x Auditing.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Auditing
|2 fast
|
700 |
1 |
|
|a Gavrilenko, Konstantin V.
|
700 |
1 |
|
|a Mikhailovsky, Andrei A.
|
776 |
0 |
8 |
|i Print version:
|z 9781849280358
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh6v9
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0025360885
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25564861
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00036115
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10438087
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391082
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3235692
|
994 |
|
|
|a 92
|b IZTAP
|