|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
JSTOR_ocn833573774 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
130221s2012 enka ob 000 0 eng d |
040 |
|
|
|a CtWfDGI
|b eng
|e pn
|c STF
|d OCLCO
|d B24X7
|d MHW
|d EBLCP
|d N$T
|d MEAUC
|d UMI
|d DEBSZ
|d JSTOR
|d OCLCO
|d YDXCP
|d OCLCQ
|d OCLCO
|d COO
|d OCLCQ
|d OCLCO
|d AGLDB
|d DGU
|d LIV
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d OCLCF
|d CEF
|d OCLCQ
|d LVT
|d STF
|d UAB
|d UKAHL
|d VT2
|d OCLCQ
|d UX1
|d OCLCO
|d OCLCQ
|d YWS
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 853454336
|a 859144312
|a 1175626752
|
020 |
|
|
|a 9781849283892
|q (electronic bk.)
|
020 |
|
|
|a 1849283893
|q (electronic bk.)
|
020 |
|
|
|z 9781849283885
|
020 |
|
|
|z 1849283885
|
020 |
|
|
|z 9781849283908
|
020 |
|
|
|z 1849283907
|
029 |
1 |
|
|a AU@
|b 000052162625
|
029 |
1 |
|
|a AU@
|b 000065313800
|
029 |
1 |
|
|a DEBBG
|b BV041432674
|
029 |
1 |
|
|a DEBBG
|b BV042741849
|
029 |
1 |
|
|a DEBSZ
|b 397540272
|
029 |
1 |
|
|a DEBSZ
|b 398286000
|
029 |
1 |
|
|a DEBSZ
|b 423732811
|
029 |
1 |
|
|a GBVCP
|b 785452850
|
029 |
1 |
|
|a AU@
|b 000067104453
|
029 |
1 |
|
|a AU@
|b 000070013591
|
035 |
|
|
|a (OCoLC)833573774
|z (OCoLC)853454336
|z (OCoLC)859144312
|z (OCoLC)1175626752
|
037 |
|
|
|a CL0500000301
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5c0r
|b JSTOR
|
050 |
|
4 |
|a HF5548.37
|b .S56 2012eb
|
072 |
|
7 |
|a BUS
|x 104000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 071000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 103000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 097000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/78
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Simmons, Andrea C.
|
245 |
1 |
0 |
|a Once more unto the breach :
|b managing information security in an uncertain world /
|c Andrea C. Simmons.
|
260 |
|
|
|a [Ely, Cambridgeshire], U.K. :
|b IT Governance Pub.,
|c 2012.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project.
|
505 |
0 |
|
|a Preface; About the Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project ... ; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); How many users are there?; How many assets require protection in your organisation?; Of the assets identified, how many servers are there?; What about information assets?; What version (or versions) of anti-virus is (are) running and how often is it (are they) being updated?; How many systems administrators are there?
|
505 |
8 |
|
|a How often are systems updated?How many exceptions (deviations) to policy are there?; When were access controls last reviewed?; What level of information security awareness is there across the organisation?; How is incident management addressed?; What about team and company communications?; What about other projects going on in your organisation at the same time?; Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Business as usual; Information ownership; Physical security; Incident.
|
505 |
8 |
|
|a Password managementLaptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction; Information security policy; Managing corporate anti-virus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud Computing; Project management; Security awareness theme; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Security awareness theme.
|
505 |
8 |
|
|a Chapter summaryChapter 5: December: Oh, for the sake of yet another proposal ... ; Security improvement programme; Fax management; Image build again; Physical security findings; Physical security solution suggestions; Other security tasks for this month; Environmental concerns; Information security awareness briefings; 'Kit' movement; Laptop users ... again!; Security awareness theme; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management.
|
505 |
8 |
|
|a Penetration testing resultsBack to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Job descriptions; Users' understanding; People management; Security awareness theme; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy; UK Data Protection Act 1998, seventh principle; Other security tasks for this month; User administration; Inventory management; Security awareness theme; Chapter summary.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Business enterprises
|x Information technology
|x Security measures.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Entreprises
|x Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Corporate Governance.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Leadership.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Development.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Workplace Culture.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Simmons, Andrea C.
|t Once more unto the breach.
|d Ely, Cambridgeshire : IT Governance Pub., 2012
|z 9781849283885
|w (OCoLC)809312693
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh3xx
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26135031
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00050155
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1186306
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 571565
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10678286
|
994 |
|
|
|a 92
|b IZTAP
|