MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn859159601
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130829s2014 flua obf 000 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCO  |d YDXCP  |d N$T  |d OCLCO  |d OCLCF  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCA  |d NLE  |d UKMGB  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB7A1229  |2 bnb 
016 7 |a 018373011  |2 Uk 
020 |a 9781466567528  |q (electronic bk.) 
020 |a 146656752X  |q (electronic bk.) 
020 |z 9781466567498 
029 1 |a AU@  |b 000052027757 
029 1 |a CHNEW  |b 000637098 
029 1 |a DEBBG  |b BV041634164 
029 1 |a UKMGB  |b 018373011 
029 1 |a AU@  |b 000070346757 
035 |a (OCoLC)859159601 
037 |a TANDF_282198  |b Ingram Content Group 
050 4 |a QA76.9.A25  |b I54 2014eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Information security management handbook .  |n Volume 7 /  |c edited by Richard O'Hanley, James S. Tiller. 
260 |a Boca Raton [Fla.] :  |b CRC Press,  |c 2014. 
300 |a 1 online resource (xiv, 400 pages :) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
505 0 |a Domain 1: TELECOMMUNICATIONS AND NETWORK SECURITY; Communications and Network Security; 1. Securing the Grid; Terry Komperda; Network Attacks and Countermeasures; 2. Attacks in Mobile Environments; Noureddine Boudriga; ; Domain 2: INFORMATION SECURITY GOVERNANCE AND RISK MANAGEMENT; Security Management Concepts and Principles; 3. Security in the Cloud; Sandy Bacik; 4. Getting the Best Out of Information Security Projects; Todd Fitzgerald; 5. Mobility and Its Impact on Enterprise Security; Prashanth Venkatesh and Balaji Raghunathan; 6. An Introduction to Digital Rights Management; Ashutosh Saxena and Ravi Sankar Veerubhotla; 7. Information Security on the Cheap; Beau Woods; 8. Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program; Robert K. Pittman, Jr; 9. Metrics for Monitoring; Sandy Bacik; Policies, Standards, Procedures, and Guidelines; 10. 
505 0 |a Security Implications of Bring Your Own Device, IT Consumerization, and Managing User Choices; Sandy Bacik; 11. Information Assurance: Open Research Questions and Future Directions; Seth J. Kinnett; Security Awareness Training; 12. Protecting Us from Us: Human Firewall Vulnerability Assessments; Ken M. Shaurette and Tom Schleppenbach; ; Domain 3: APPLICATION DEVELOPMENT SECURITY; Application Issues; 13. Service-Oriented Architecture; Walter B. Williams; Systems Development Controls; 14. Managing the Security Testing Process; Anthony Meholic; 15. Security and Resilience in the Software Development Life Cycle; Mark S. Merkow and Lakshmikanth Raghavan; ; Domain 4: CRYPTOGRAPHY; Cryptographic Concepts, Methodologies, and Practices; 16. Cloud Cryptography; Jeff Stapleton; ; Domain 5: SECURITY ARCHITECTURE AND DESIGN; Principles of Security Models, Architectures, and Evaluation Criteria; 17. 
505 0 |a Identity and Access Management Architecture; Jeff Crume; 18. FedRAMP SM : Entry or Exit Ramp for Cloud Security?; Debra S. Herrmann; ; Domain 6: OPERATIONS SECURITY; Concepts; 19. Data Storage and Network Security; Greg Schulz; ; Domain 7: LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS; Information Law; 20. National Patient Identifier and Patient Privacy in the Digital Era; Tim Godlove and Adrian Ball; 21. Addressing Social Media Security and Privacy Challenges; Rebecca Herold; Investigations; 22. What Is Digital Forensics and What Should You Know about It?; Greg Gogolin; 23. eDiscovery; David G. Hill; 24. Overview of the Steps of the Electronic Discovery Reference Model; David G. Hill; 25. Cell Phone Protocols and Operating Systems; Eamon P. Doherty; Major Categories of Computer Crime; 26. Hacktivism: The Whats, Whys, and Wherefores; Chris Hare; Compliance; 27. 
505 0 |a PCI Compliance; Tyler Justin Speed; 28. HIPAA /HITECH Compliance Overview 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Management  |v Handbooks, manuals, etc. 
650 0 |a Data protection  |v Handbooks, manuals, etc. 
650 6 |a Sécurité informatique  |x Gestion  |v Guides, manuels, etc. 
650 6 |a Protection de l'information (Informatique)  |v Guides, manuels, etc. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
700 1 |a O'Hanley, Richard. 
700 1 |a Tiller, James S. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781466567498/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ebrary  |b EBRY  |n ebr10747375 
938 |a EBSCOhost  |b EBSC  |n 631619 
938 |a YBP Library Services  |b YANK  |n 10376554 
994 |a 92  |b IZTAP