|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn859159601 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130829s2014 flua obf 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCO
|d YDXCP
|d N$T
|d OCLCO
|d OCLCF
|d OCL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCA
|d NLE
|d UKMGB
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB7A1229
|2 bnb
|
016 |
7 |
|
|a 018373011
|2 Uk
|
020 |
|
|
|a 9781466567528
|q (electronic bk.)
|
020 |
|
|
|a 146656752X
|q (electronic bk.)
|
020 |
|
|
|z 9781466567498
|
029 |
1 |
|
|a AU@
|b 000052027757
|
029 |
1 |
|
|a CHNEW
|b 000637098
|
029 |
1 |
|
|a DEBBG
|b BV041634164
|
029 |
1 |
|
|a UKMGB
|b 018373011
|
029 |
1 |
|
|a AU@
|b 000070346757
|
035 |
|
|
|a (OCoLC)859159601
|
037 |
|
|
|a TANDF_282198
|b Ingram Content Group
|
050 |
|
4 |
|a QA76.9.A25
|b I54 2014eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Information security management handbook .
|n Volume 7 /
|c edited by Richard O'Hanley, James S. Tiller.
|
260 |
|
|
|a Boca Raton [Fla.] :
|b CRC Press,
|c 2014.
|
300 |
|
|
|a 1 online resource (xiv, 400 pages :) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Domain 1: TELECOMMUNICATIONS AND NETWORK SECURITY; Communications and Network Security; 1. Securing the Grid; Terry Komperda; Network Attacks and Countermeasures; 2. Attacks in Mobile Environments; Noureddine Boudriga; ; Domain 2: INFORMATION SECURITY GOVERNANCE AND RISK MANAGEMENT; Security Management Concepts and Principles; 3. Security in the Cloud; Sandy Bacik; 4. Getting the Best Out of Information Security Projects; Todd Fitzgerald; 5. Mobility and Its Impact on Enterprise Security; Prashanth Venkatesh and Balaji Raghunathan; 6. An Introduction to Digital Rights Management; Ashutosh Saxena and Ravi Sankar Veerubhotla; 7. Information Security on the Cheap; Beau Woods; 8. Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program; Robert K. Pittman, Jr; 9. Metrics for Monitoring; Sandy Bacik; Policies, Standards, Procedures, and Guidelines; 10.
|
505 |
0 |
|
|a Security Implications of Bring Your Own Device, IT Consumerization, and Managing User Choices; Sandy Bacik; 11. Information Assurance: Open Research Questions and Future Directions; Seth J. Kinnett; Security Awareness Training; 12. Protecting Us from Us: Human Firewall Vulnerability Assessments; Ken M. Shaurette and Tom Schleppenbach; ; Domain 3: APPLICATION DEVELOPMENT SECURITY; Application Issues; 13. Service-Oriented Architecture; Walter B. Williams; Systems Development Controls; 14. Managing the Security Testing Process; Anthony Meholic; 15. Security and Resilience in the Software Development Life Cycle; Mark S. Merkow and Lakshmikanth Raghavan; ; Domain 4: CRYPTOGRAPHY; Cryptographic Concepts, Methodologies, and Practices; 16. Cloud Cryptography; Jeff Stapleton; ; Domain 5: SECURITY ARCHITECTURE AND DESIGN; Principles of Security Models, Architectures, and Evaluation Criteria; 17.
|
505 |
0 |
|
|a Identity and Access Management Architecture; Jeff Crume; 18. FedRAMP SM : Entry or Exit Ramp for Cloud Security?; Debra S. Herrmann; ; Domain 6: OPERATIONS SECURITY; Concepts; 19. Data Storage and Network Security; Greg Schulz; ; Domain 7: LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS; Information Law; 20. National Patient Identifier and Patient Privacy in the Digital Era; Tim Godlove and Adrian Ball; 21. Addressing Social Media Security and Privacy Challenges; Rebecca Herold; Investigations; 22. What Is Digital Forensics and What Should You Know about It?; Greg Gogolin; 23. eDiscovery; David G. Hill; 24. Overview of the Steps of the Electronic Discovery Reference Model; David G. Hill; 25. Cell Phone Protocols and Operating Systems; Eamon P. Doherty; Major Categories of Computer Crime; 26. Hacktivism: The Whats, Whys, and Wherefores; Chris Hare; Compliance; 27.
|
505 |
0 |
|
|a PCI Compliance; Tyler Justin Speed; 28. HIPAA /HITECH Compliance Overview
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Management
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Data protection
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Guides, manuels, etc.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
700 |
1 |
|
|a O'Hanley, Richard.
|
700 |
1 |
|
|a Tiller, James S.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781466567498/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10747375
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 631619
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10376554
|
994 |
|
|
|a 92
|b IZTAP
|