Cargando…

Lessons Learned : How to protect critical information infrastructure /

""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) i...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Viira, Toomas (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely : IT Governance Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_on1021809406
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 180203s2018 enk ob 000 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d MERUC  |d YDX  |d JSTOR  |d OCLCF  |d UMI  |d STF  |d EZ9  |d TOH  |d COO  |d IDB  |d N$T  |d DEBBG  |d OCLCQ  |d K6U  |d YDXIT  |d OCLCQ  |d OCLCO  |d FAU  |d OCLCQ  |d OCLCO 
019 |a 1020632870  |a 1020867575  |a 1026400859 
020 |a 9781849289580  |q (electronic book) 
020 |a 1849289581  |q (electronic book) 
020 |z 1849289573 
020 |z 9781849289573 
020 |z 9781849289597 
020 |z 184928959X 
029 1 |a AU@  |b 000062592608 
029 1 |a AU@  |b 000067022175 
029 1 |a AU@  |b 000070439071 
029 1 |a GBVCP  |b 1016524544 
029 1 |a AU@  |b 000070032509 
035 |a (OCoLC)1021809406  |z (OCoLC)1020632870  |z (OCoLC)1020867575  |z (OCoLC)1026400859 
037 |a 22573/ctt1xmk8dn  |b JSTOR 
050 4 |a HF5548.37  |b .V55 2018 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Viira, Toomas,  |e author. 
245 1 0 |a Lessons Learned :  |b How to protect critical information infrastructure /  |c Toomas Viira. 
264 1 |a Ely :  |b IT Governance Publishing,  |c 2018. 
300 |a 1 online resource (92 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover; Title; Copyright; About the Author; Acknowledgements; Contents; Introduction; Part 1: Critical infrastructure; Chapter 1: Critical infrastructure services; Chapter 2: Description of service and service level; Chapter 3: Providers of critical infrastructure services; Chapter 4: Critical activities and required resources; Chapter 5: Interdependencies of services; Chapter 6: Visualisation of information; Part 2: Critical information infrastructure; Chapter 7: Identification of important information systems; Chapter 8: Interdependencies of information systems. 
505 8 |a Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10: Threats and vulnerabilities of information systems; Chapter 11: Assessment of the impact of service disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation of security measures; Chapter 14: Organisation required to protect critical information infrastructure; Chapter 15: NIS Directive; Chapter 16: Assessment of the security level; Chapter 17: Network scanning; Chapter 18: Business continuity plan and testing. 
505 8 |a Part 5: Protection system supporting activitiesChapter 19: Reliable relations and maintaining them; Chapter 20: Sharing information; Chapter 21: Training people; Part 6: Perfecting the system; Chapter 22: Improvement of the system; Part 7: Backup plan; Chapter 23: Life without IT; Appendix 1: Lessons learned; ITG Resources. 
520 |a ""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI 
504 |a Includes bibliographical references. 
588 0 |a Description based on online resource; title from PDF title page (viewed June 10, 2020). 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Data protection. 
650 0 |a Information resources management. 
650 0 |a Information superhighway. 
650 2 |a Information Management 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Gestion de l'information. 
650 6 |a Autoroutes électroniques. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Data protection  |2 fast 
650 7 |a Information resources management  |2 fast 
650 7 |a Information superhighway  |2 fast 
776 0 8 |i Print version:  |a Viira, Toomas.  |t Lessons Learned: Critical Information Infrastructure Protection.  |d Ely : IT Governance Publishing, ©2018  |z 9781849289573 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1xhr7hq  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5244626 
938 |a EBSCOhost  |b EBSC  |n 1696465 
938 |a YBP Library Services  |b YANK  |n 15115708 
994 |a 92  |b IZTAP