|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn688587509 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
100928s2008 enka ob 001 0 eng d |
040 |
|
|
|a SFB
|b eng
|e pn
|c SFB
|d E7B
|d MUQ
|d OCLCQ
|d UMI
|d B24X7
|d OCLCQ
|d N$T
|d ALAUL
|d OCLCQ
|d CUI
|d VLB
|d OCLCO
|d YDXCP
|d OCLCQ
|d OCLCO
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d LIV
|d OCLCA
|d OCLCF
|d WYU
|d EQF
|d UHL
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 649911923
|a 761692517
|a 1112978293
|a 1113751255
|
020 |
|
|
|a 9781906124397
|q (electronic bk.)
|
020 |
|
|
|a 1906124396
|q (electronic bk.)
|
020 |
|
|
|z 9781902505909
|q (pbk.)
|
020 |
|
|
|z 1902505905
|q (pbk.)
|
029 |
1 |
|
|a AU@
|b 000060061747
|
035 |
|
|
|a (OCoLC)688587509
|z (OCoLC)649911923
|z (OCoLC)761692517
|z (OCoLC)1112978293
|z (OCoLC)1113751255
|
050 |
|
4 |
|a QA76.9.A25
|b I64 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8068/076
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Information security management principles :
|b an ISEB certificate /
|c Andy Taylor (editor) [and others].
|
260 |
|
|
|a Swindon, U.K. :
|b British Computer Society,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xix, 193 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming increasingly clear that technological solutions are not the only answer. Research conducted in 2007 suggests that at least 80% of data leakages are caused by staff rather than IT systems (source: Financial Times/Forrester Research, Nov-07). It is clear therefore that Information Security should be viewed as a management function rather than one of IT alone. Here, the authors outline the main management principles designed to help you secure your data, and raise awareness of the issues involved.
|
505 |
0 |
|
|a Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Management
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Information technology
|x Security measures
|v Study guides.
|
650 |
|
0 |
|a Data protection
|x Management
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Gestion
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
655 |
|
7 |
|a Study guides
|2 fast
|
700 |
1 |
|
|a Taylor, Andy.
|4 edt
|4 aut
|
710 |
2 |
|
|a British Computer Society.
|
776 |
0 |
8 |
|i Print version:
|t Information security management principles.
|d Swindon : British Computer Society, ©2008
|z 9781902505909
|w (OCoLC)459841146
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781902505909/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3368529
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9930722
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 393421
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10393080
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00035465
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0012528284
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH20204893
|
938 |
|
|
|a BCS, The Chartered Institute for IT
|b BCSL
|n 978-1-906124-39-7
|
994 |
|
|
|a 92
|b IZTAP
|