Cargando…

Information security management principles /

In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Alexander, David (Information security practitioner)
Otros Autores: Finch, Amanda, Sutton, David (Information security practitioner), Taylor, Andy
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Swindon, U.K. : BCS Learning & Development Ltd., 2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn854569528
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130715s2013 enka ob 001 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d OCLCO  |d N$T  |d KNOVL  |d OCLCF  |d COO  |d YDXCP  |d EBLCP  |d UMI  |d DEBSZ  |d B24X7  |d OCLCO  |d OCLCQ  |d OCLCO  |d TJC  |d OCLCQ  |d OCLCO  |d Z5A  |d ZCU  |d MERUC  |d OCLCQ  |d OCLCA  |d ICG  |d CNNOR  |d STF  |d MERER  |d CUY  |d CEF  |d ERL  |d OCLCQ  |d LVT  |d AGLDB  |d OCLCQ  |d DKC  |d OCLCQ  |d CNCEN  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 851971957  |a 858312198  |a 907208076  |a 988807173  |a 1076625903  |a 1104501689  |a 1105770860 
020 |a 9781780171760  |q (electronic bk.) 
020 |a 1780171765  |q (electronic bk.) 
020 |a 9781628702590  |q (electronic bk.) 
020 |a 1628702591  |q (electronic bk.) 
020 |a 1780171757 
020 |a 9781780171753 
020 |a 9781780171777  |q (ePUB) 
020 |a 1780171773  |q (ePUB) 
020 |a 9781780171784  |q (Kindle) 
020 |a 1780171781  |q (Kindle) 
020 |z 9781780171753 
024 8 |a 9781780171753 
029 1 |a AU@  |b 000052007080 
029 1 |a AU@  |b 000053295676 
029 1 |a CHBIS  |b 009923487 
029 1 |a CHNEW  |b 000611744 
029 1 |a CHNEW  |b 001051759 
029 1 |a CHVBK  |b 302462686 
029 1 |a CHVBK  |b 56770579X 
029 1 |a DEBBG  |b BV041432009 
029 1 |a DEBBG  |b BV044189244 
029 1 |a DEBSZ  |b 397562845 
029 1 |a DEBSZ  |b 398278989 
029 1 |a NLGGC  |b 37164299X 
035 |a (OCoLC)854569528  |z (OCoLC)851971957  |z (OCoLC)858312198  |z (OCoLC)907208076  |z (OCoLC)988807173  |z (OCoLC)1076625903  |z (OCoLC)1104501689  |z (OCoLC)1105770860 
037 |a CL0500000276  |b Safari Books Online 
050 4 |a QA76.9.A25  |b A44 2013eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8068  |2 23 
049 |a UAMI 
100 1 |a Alexander, David  |c (Information security practitioner) 
245 1 0 |a Information security management principles /  |c Andy Taylor (editor), David Alexander, Amanda Finch, David Sutton. 
260 |a Swindon, U.K. :  |b BCS Learning & Development Ltd.,  |c 2013. 
300 |a 1 online resource (xvi, 208 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Copyright; CONTENTS; LIST OF FIGURES AND TABLES; AUTHORS; ACKNOWLEDGEMENTS; ABBREVIATIONS; PREFACE; 1 INFORMATION SECURITY PRINCIPLES; CONCEPTS AND DEFINITIONS; THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 2 INFORMATION RISK; THREATS TO, AND VULNERABILITIES OF, INFORMATION SYSTEMS; RISK MANAGEMENT; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 3 INFORMATION SECURITY FRAMEWORK; ORGANISATIONS AND RESPONSIBILITIES; ORGANISATIONAL POLICY, STANDARDS AND PROCEDURES; INFORMATION SECURITY GOVERNANCE; INFORMATION SECURITY IMPLEMENTATION. 
505 8 |a Security incident managementlegal framework; security standards and procedures; pointers for activities in this chapter; 4 procedural and people security controls; people; user access controls; training and awareness; pointers for activities in this chapter; 5 technical security controls; protection from malicious software; networks and communications; external services; cloud computing; it infrastructure; pointers for activities in this chapter; 6 software development and life cycle; testing, audit and review; systems development and support; pointers for activities in this chapter. 
505 8 |a 7 physical and environmental securitylearning outcomes; general controls; physical security; technical security; procedural security; protection of equipment; processes to handle intruder alerts; clear screen and desk policy; moving property on and off site; procedures for secure disposal; security requirements in delivery and loading areas; pointers for activities in this chapter; 8 disaster recovery and business continuity management; learning outcomes; dr/bcp, risk assessment and impact analysis; writing and implementing plans; documentation, maintenance and testing. 
505 8 |a LINKS TO MANAGED SERVICE PROVISION AND OUTSOURCINGSECURE OFF-SITE STORAGE OF VITAL MATERIAL; INVOLVEMENT OF PERSONNEL, SUPPLIERS AND IT SYSTEMS PROVIDERS; SECURITY INCIDENT MANAGEMENT; COMPLIANCE WITH STANDARDS; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; 9 OTHER TECHNICAL ASPECTS; INVESTIGATIONS AND FORENSICS; ROLE OF CRYPTOGRAPHY; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; APPENDIX A; GLOSSARY; INDEX; Back Cover. 
520 |a In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources. 
542 |f Copyright © 2013 BCS Learning & Development Limited  |g 2013 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
700 1 |a Finch, Amanda. 
700 1 |a Sutton, David  |c (Information security practitioner) 
700 1 |a Taylor, Andy. 
776 0 8 |i Print version:  |a Taylor, Andy.  |t Information Security Management Principles.  |d Swindon : BCS Learning & Development Limited, ©2013  |z 9781780171753 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781780171753/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00057433 
938 |a ebrary  |b EBRY  |n ebr10723956 
938 |a EBSCOhost  |b EBSC  |n 596167 
938 |a YBP Library Services  |b YANK  |n 10826164 
994 |a 92  |b IZTAP