Cargando…

Information security fundamentals /

"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Peltier, Thomas R. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton [Florida] : CRC Press, Taylor & Francis Group, [2014]
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn858762576
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 130921t20142014flua ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d DEBSZ  |d WAU  |d UMI  |d COO  |d DEBBG  |d OCLCQ  |d CRCPR  |d OCLCQ  |d OCLCF  |d CNSPO  |d STF  |d YDXCP  |d LVT  |d GGVRL  |d OCLCQ  |d MOR  |d Z5A  |d VGM  |d MERUC  |d OCLCQ  |d UAB  |d OCLCQ  |d OCLCA  |d OCLCQ  |d CEF  |d OCLCQ  |d U3W  |d OCLCQ  |d WYU  |d LEAUB  |d UKAHL  |d OCLCQ  |d VT2  |d CZL  |d OCLCO  |d OCLCQ 
019 |a 869214400  |a 872686344  |a 1065904271  |a 1295596348 
020 |a 9781439810637  |q (electronic book) 
020 |a 143981063X  |q (electronic book) 
020 |a 9781439810620  |q (paper) 
020 |a 1439810621  |q (paper) 
020 |a 0429130287 
020 |a 9780429130281 
024 7 |a 10.1201/b15573  |2 doi 
029 1 |a AU@  |b 000055917154 
029 1 |a DEBBG  |b BV041778530 
029 1 |a DEBSZ  |b 397628536 
029 1 |a DEBSZ  |b 404330207 
029 1 |a GBVCP  |b 882838547 
029 1 |a NZ1  |b 15342432 
029 1 |a NZ1  |b 15550141 
035 |a (OCoLC)858762576  |z (OCoLC)869214400  |z (OCoLC)872686344  |z (OCoLC)1065904271  |z (OCoLC)1295596348 
037 |a CL0500000366  |b Safari Books Online 
050 4 |a QA76.9.A25  |b P427 2013 
082 0 4 |a 005.8 
084 |a BUS073000  |a COM032000  |a COM053000  |2 bisacsh 
049 |a UAMI 
100 1 |a Peltier, Thomas R.,  |e author. 
245 1 0 |a Information security fundamentals /  |c Thomas R. Peltier. 
250 |a Second edition. 
264 1 |a Boca Raton [Florida] :  |b CRC Press, Taylor & Francis Group,  |c [2014] 
264 4 |c ©20 
264 4 |c ©2014 
300 |a 1 online resource (375 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references. 
505 0 |a 1. Developing Policies -- 2. Organization of Information Security -- 3. Cryptology -- 4. Risk Management: The Facilitated Risk Analysis and Assessment Process -- 5. Building and Maintaining an Effective Security Awareness Program -- 6. Physical Security -- 7. Disaster Recovery and Business Continuity Planning -- 8. Continuity of Operations Planning -- 9. Access Controls -- 10. Information System Development, Acquisition, and Maintenance -- 11. Information Security Incident Management -- 12. Asset Classification -- 13. Threats to Information Security -- 14. Information Security Policies: A Practitioner's View -- Glossary -- Appendix A. Facilitated Risk Analysis and Assessment Process (FRAAP) -- Appendix B. Business Impact Analysis. 
520 |a "Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program. The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"--  |c Provided by publisher. 
588 0 |a Print version record. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a BUSINESS & ECONOMICS  |x Commerce.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
776 0 8 |i Print version:  |a Peltier, Thomas R.  |t Information security fundamentals.  |b Second edition.  |d Boca Raton, [Florida] : CRC Press, Taylor & Francis Group, [2014]  |z 9781439810620  |w (DLC) 2013023074  |w (OCoLC)851068420 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439810637/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH19747950 
938 |a CRC Press  |b CRCP  |n AUP0KE10500PDF 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1375200 
938 |a Cengage Learning  |b GVRL  |n GVRL8QEO 
938 |a YBP Library Services  |b YANK  |n 10690117 
994 |a 92  |b IZTAP