Cargando…

Once more unto the breach : managing information security in an uncertain world /

In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book exami...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Simmons, Andrea C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Ely, Cambridgeshire], U.K. : IT Governance Pub., 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 JSTOR_ocn833573774
003 OCoLC
005 20231005004200.0
006 m o d
007 cr zn|||||||||
008 130221s2012 enka ob 000 0 eng d
040 |a CtWfDGI  |b eng  |e pn  |c STF  |d OCLCO  |d B24X7  |d MHW  |d EBLCP  |d N$T  |d MEAUC  |d UMI  |d DEBSZ  |d JSTOR  |d OCLCO  |d YDXCP  |d OCLCQ  |d OCLCO  |d COO  |d OCLCQ  |d OCLCO  |d AGLDB  |d DGU  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d OCLCF  |d CEF  |d OCLCQ  |d LVT  |d STF  |d UAB  |d UKAHL  |d VT2  |d OCLCQ  |d UX1  |d OCLCO  |d OCLCQ  |d YWS  |d OCLCQ  |d OCLCO 
019 |a 853454336  |a 859144312  |a 1175626752 
020 |a 9781849283892  |q (electronic bk.) 
020 |a 1849283893  |q (electronic bk.) 
020 |z 9781849283885 
020 |z 1849283885 
020 |z 9781849283908 
020 |z 1849283907 
029 1 |a AU@  |b 000052162625 
029 1 |a AU@  |b 000065313800 
029 1 |a DEBBG  |b BV041432674 
029 1 |a DEBBG  |b BV042741849 
029 1 |a DEBSZ  |b 397540272 
029 1 |a DEBSZ  |b 398286000 
029 1 |a DEBSZ  |b 423732811 
029 1 |a GBVCP  |b 785452850 
029 1 |a AU@  |b 000067104453 
029 1 |a AU@  |b 000070013591 
035 |a (OCoLC)833573774  |z (OCoLC)853454336  |z (OCoLC)859144312  |z (OCoLC)1175626752 
037 |a CL0500000301  |b Safari Books Online 
037 |a 22573/ctt4k5c0r  |b JSTOR 
050 4 |a HF5548.37  |b .S56 2012eb 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
072 7 |a BUS  |x 097000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Simmons, Andrea C. 
245 1 0 |a Once more unto the breach :  |b managing information security in an uncertain world /  |c Andrea C. Simmons. 
260 |a [Ely, Cambridgeshire], U.K. :  |b IT Governance Pub.,  |c 2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
520 |a In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project. 
505 0 |a Preface; About the Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project ... ; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); How many users are there?; How many assets require protection in your organisation?; Of the assets identified, how many servers are there?; What about information assets?; What version (or versions) of anti-virus is (are) running and how often is it (are they) being updated?; How many systems administrators are there? 
505 8 |a How often are systems updated?How many exceptions (deviations) to policy are there?; When were access controls last reviewed?; What level of information security awareness is there across the organisation?; How is incident management addressed?; What about team and company communications?; What about other projects going on in your organisation at the same time?; Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Business as usual; Information ownership; Physical security; Incident. 
505 8 |a Password managementLaptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction; Information security policy; Managing corporate anti-virus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud Computing; Project management; Security awareness theme; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Security awareness theme. 
505 8 |a Chapter summaryChapter 5: December: Oh, for the sake of yet another proposal ... ; Security improvement programme; Fax management; Image build again; Physical security findings; Physical security solution suggestions; Other security tasks for this month; Environmental concerns; Information security awareness briefings; 'Kit' movement; Laptop users ... again!; Security awareness theme; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management. 
505 8 |a Penetration testing resultsBack to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Job descriptions; Users' understanding; People management; Security awareness theme; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy; UK Data Protection Act 1998, seventh principle; Other security tasks for this month; User administration; Inventory management; Security awareness theme; Chapter summary. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
650 0 |a Business enterprises  |x Information technology  |x Security measures. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Entreprises  |x Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Simmons, Andrea C.  |t Once more unto the breach.  |d Ely, Cambridgeshire : IT Governance Pub., 2012  |z 9781849283885  |w (OCoLC)809312693 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh3xx  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26135031 
938 |a Books 24x7  |b B247  |n bks00050155 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1186306 
938 |a EBSCOhost  |b EBSC  |n 571565 
938 |a YBP Library Services  |b YANK  |n 10678286 
994 |a 92  |b IZTAP