Cargando…

Information assurance handbook : effective computer security and risk management strategies /

"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to inte...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Schou, Corey
Otros Autores: Hernandez, Steven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, ©2015.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn894514710
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 141105s2015 nyua obf 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d S4S  |d B24X7  |d COO  |d DEBBG  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCA  |d TOH  |d YDX  |d EBLCP  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1164491873 
020 |a 9780071826310 
020 |a 0071826319 
020 |z 9780071821650 
020 |z 0071821651 
029 1 |a AU@  |b 000057232430 
029 1 |a DEBBG  |b BV042490063 
029 1 |a DEBSZ  |b 434832448 
035 |a (OCoLC)894514710  |z (OCoLC)1164491873 
037 |a CL0500000498  |b Safari Books Online 
050 4 |a TK5105.59  |b .I646 2015 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Schou, Corey. 
245 1 0 |a Information assurance handbook :  |b effective computer security and risk management strategies /  |c Corey Schou, Steven Hernandez. 
246 3 0 |a Effective computer security and risk management strategies 
260 |a New York :  |b McGraw-Hill Education,  |c ©2015. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed October 29, 2014). 
504 |a Includes bibliographical references and index. 
520 |a "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--  |c Provided by publisher 
505 0 |a Cover -- Title -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Information Assurance Basics -- Chapter 1 Developing an Information Assurance Strategy -- Comprehensive -- Independent -- Legal and Regulatory Requirements -- Living Document -- Long Life Span -- Customizable and Pragmatic -- Risk-Based Approach -- Organizationally Significant -- Strategic, Tactical, and Operational -- Concise, Well-Structured, and Extensible -- Critical Thinking Exercises -- Chapter 2 The Need for Information Assurance 
505 8 |a Protection of Critical and Sensitive Assets -- Compliance to Regulations and Circulars/Laws -- Meeting Audit and Compliance Requirements -- Providing Competitive Advantage -- Critical Thinking Exercises -- Chapter 3 Information Assurance Principles -- The MSR Model of Information Assurance -- Information Assurance -- Information Security -- Information Protection -- Cybersecurity -- Information Assurance: Business Enabler -- Information Assurance: Protects the Fabric of an Organization's Systems -- Information Assurance: Cost Effective and Cost Beneficial 
505 8 |a Information Assurance: Shared Responsibilities -- Information Assurance: Robust Approach -- Information Assurance: Reassessed Periodically -- Information Assurance: Restricted by Social Obligations -- Implications from Lack of Information Assurance -- Penalties from a Legal/Regulatory Authorities -- Loss of Information Assets -- Operational Losses and Operational Risk Management -- Customer Losses -- Loss of Image and Reputation -- Further Reading -- Critical Thinking Exercises -- Chapter 4 Information Assurance Concepts -- Defense in Depth -- Confidentiality, Integrity, and Availability 
505 8 |a Confidentiality -- Integrity -- Availability -- CIA Balance -- Nonrepudiation and Authentication -- Nonrepudiation -- Identification, Authentication, Authorization, and Accountability -- Identification -- Authentication -- Authorization -- Accountability -- Privacy's Relationship to Information Assurance -- Assets, Threats, Vulnerabilities, Risks, and Controls -- Common Threats -- Vulnerabilities -- Controls -- Cryptology -- Codes and Ciphers -- Further Reading -- Critical Thinking Exercises -- Chapter 5 Organizations Providing Resources for Professionals 
505 8 |a Organizations Providing Resources for Professionals -- (ISC)2 International Information System Security Certification Consortium -- Computing Technology Industry Association -- Information System Audit and Control Association -- Information System Security Association -- SANS Institute -- Disaster Recovery Institute, International -- Business Continuity Institute -- Deciding Among Certifications -- Codes of Ethics -- Further Reading -- Critical Thinking Exercises -- Chapter 6 Information Assurance Management System -- Security Considerations for the Information Asset Life Cycle 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc. 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 0 |a Data protection  |v Handbooks, manuals, etc. 
650 0 |a Information storage and retrieval systems  |x Security measures  |v Handbooks, manuals, etc. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 6 |a Sécurité informatique  |v Guides, manuels, etc. 
650 6 |a Protection de l'information (Informatique)  |v Guides, manuels, etc. 
650 6 |a Systèmes d'information  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information storage and retrieval systems  |x Security measures  |2 fast 
655 7 |a handbooks.  |2 aat 
655 7 |a Handbooks and manuals  |2 fast 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf 
700 1 |a Hernandez, Steven. 
776 0 8 |i Print version:  |a Schou, Corey.  |t Information Assurance Handbook: Effective Computer Security and Risk Management Strategies.  |d : McGraw-Hill Education, ©2014 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071821650/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00072511 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6257064 
938 |a YBP Library Services  |b YANK  |n 16841030 
994 |a 92  |b IZTAP