|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn914151232 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
150801s2015 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d DEBSZ
|d OCLCQ
|d YDXCP
|d N$T
|d STF
|d B24X7
|d OCLCO
|d COO
|d OCLCF
|d OCLCO
|d JSTOR
|d OCLCO
|d OCLCQ
|d OCLCO
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d OCLCQ
|d LVT
|d AU@
|d OCLCQ
|d AUW
|d OCLCQ
|d UKSSU
|d VLY
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 921279215
|a 1162151827
|a 1241946670
|
020 |
|
|
|a 9781849287418
|q (electronic bk.)
|
020 |
|
|
|a 1849287414
|q (electronic bk.)
|
020 |
|
|
|z 9781849287425
|
020 |
|
|
|z 1849287422
|
020 |
|
|
|z 1849287406
|
020 |
|
|
|z 9781849287401
|
029 |
1 |
|
|a AU@
|b 000060909286
|
029 |
1 |
|
|a AU@
|b 000067103023
|
029 |
1 |
|
|a DEBSZ
|b 442838956
|
029 |
1 |
|
|a DEBSZ
|b 446071501
|
035 |
|
|
|a (OCoLC)914151232
|z (OCoLC)921279215
|z (OCoLC)1162151827
|z (OCoLC)1241946670
|
037 |
|
|
|a 22573/ctt1508j10
|b JSTOR
|
050 |
|
4 |
|a K3264.C65
|
072 |
|
7 |
|a SOC
|x 004000
|2 bisacsh
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 364.16
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mooney, Tom.
|
245 |
1 |
0 |
|a Information Security A Practical Guide :
|b Bridging the gap between IT and management.
|
260 |
|
|
|a Ely :
|b IT Governance Ltd,
|c 2015.
|
300 |
|
|
|a 1 online resource (134 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title; Copyright; Contents; Chapter 1: Day One as a Security Professional; Chapter Overview; Objectives; Your First Day; Confidentiality, Integrity and Availability (CIA); Getting to Know the Business; Key IT Personnel; What is the Security Culture?; Identifying the Gaps in Security; Chapter 2: Business Impact of Breaches; Chapter Overview; Objectives; How to Assess the Impact; Data Types; Impacts; Reputational Damage; Personal Impact; Contractual Impact; Financial Impact; Legal Impacts; Chapter 3: Business Risk Appetite; Chapter Overview; Objectives; Risk Appetite; Risk Treatments.
|
505 |
8 |
|
|a Chapter 4: ThreatsChapter Overview; Objectives; Types of Threats; Hackers; Malware Writers; Script Kiddies; Journalists; Criminals; Physical Intruder; Researchers; Hacktivists; Disgruntled Employees; Chapter 5: Quick and Dirty Risk Assessment; Chapter Overview; Objectives; Identifying Risks; Defining the Risk Level; Risk Table; Realigning the Risk Level; Chapter 6: Getting Buy-in From Your Peers; Chapter Overview; Objectives; Points of Contact with your Peers; How to Engage with your Peers; Chapter 7: Documenting the System For Everyone; Chapter Overview; Objectives; Setting the Scene.
|
505 |
8 |
|
|a EntitiesService Overview; Adding Boundaries; Showing Information Flow; Adding the Threats; Chapter 8: Mapping Data in the System; Chapter Overview; Objectives; Mapping Data; Chapter 9: Penetration Testing; Chapter Overview; Objectives; Types of Penetration Test; Scoping the test; Trusting the Testers; Implementing Fixes; Chapter 10: Information Security Policy; Chapter Overview; Objectives; The Advantages of Security Policies; Giving Your Policies Teeth; Key Security Policies; Ways of Ensuring Your Policy is Read; ITG Resources.
|
520 |
|
|
|a Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
|
546 |
|
|
|a English.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Criminology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Information technology
|x Management
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Mooney, Tom.
|t Information Security A Practical Guide : Bridging the gap between IT and management.
|d Ely : IT Governance Ltd, ©2015
|z 9781849287401
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt155j4c1
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00093177
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL2048580
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1030092
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12535325
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12535376
|
994 |
|
|
|a 92
|b IZTAP
|