|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn894514710 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141105s2015 nyua obf 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d S4S
|d B24X7
|d COO
|d DEBBG
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d TOH
|d YDX
|d EBLCP
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1164491873
|
020 |
|
|
|a 9780071826310
|
020 |
|
|
|a 0071826319
|
020 |
|
|
|z 9780071821650
|
020 |
|
|
|z 0071821651
|
029 |
1 |
|
|a AU@
|b 000057232430
|
029 |
1 |
|
|a DEBBG
|b BV042490063
|
029 |
1 |
|
|a DEBSZ
|b 434832448
|
035 |
|
|
|a (OCoLC)894514710
|z (OCoLC)1164491873
|
037 |
|
|
|a CL0500000498
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .I646 2015
|
082 |
0 |
4 |
|a 658.4/78
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Schou, Corey.
|
245 |
1 |
0 |
|a Information assurance handbook :
|b effective computer security and risk management strategies /
|c Corey Schou, Steven Hernandez.
|
246 |
3 |
0 |
|a Effective computer security and risk management strategies
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c ©2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed October 29, 2014).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--
|c Provided by publisher
|
505 |
0 |
|
|a Cover -- Title -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Information Assurance Basics -- Chapter 1 Developing an Information Assurance Strategy -- Comprehensive -- Independent -- Legal and Regulatory Requirements -- Living Document -- Long Life Span -- Customizable and Pragmatic -- Risk-Based Approach -- Organizationally Significant -- Strategic, Tactical, and Operational -- Concise, Well-Structured, and Extensible -- Critical Thinking Exercises -- Chapter 2 The Need for Information Assurance
|
505 |
8 |
|
|a Protection of Critical and Sensitive Assets -- Compliance to Regulations and Circulars/Laws -- Meeting Audit and Compliance Requirements -- Providing Competitive Advantage -- Critical Thinking Exercises -- Chapter 3 Information Assurance Principles -- The MSR Model of Information Assurance -- Information Assurance -- Information Security -- Information Protection -- Cybersecurity -- Information Assurance: Business Enabler -- Information Assurance: Protects the Fabric of an Organization's Systems -- Information Assurance: Cost Effective and Cost Beneficial
|
505 |
8 |
|
|a Information Assurance: Shared Responsibilities -- Information Assurance: Robust Approach -- Information Assurance: Reassessed Periodically -- Information Assurance: Restricted by Social Obligations -- Implications from Lack of Information Assurance -- Penalties from a Legal/Regulatory Authorities -- Loss of Information Assets -- Operational Losses and Operational Risk Management -- Customer Losses -- Loss of Image and Reputation -- Further Reading -- Critical Thinking Exercises -- Chapter 4 Information Assurance Concepts -- Defense in Depth -- Confidentiality, Integrity, and Availability
|
505 |
8 |
|
|a Confidentiality -- Integrity -- Availability -- CIA Balance -- Nonrepudiation and Authentication -- Nonrepudiation -- Identification, Authentication, Authorization, and Accountability -- Identification -- Authentication -- Authorization -- Accountability -- Privacy's Relationship to Information Assurance -- Assets, Threats, Vulnerabilities, Risks, and Controls -- Common Threats -- Vulnerabilities -- Controls -- Cryptology -- Codes and Ciphers -- Further Reading -- Critical Thinking Exercises -- Chapter 5 Organizations Providing Resources for Professionals
|
505 |
8 |
|
|a Organizations Providing Resources for Professionals -- (ISC)2 International Information System Security Certification Consortium -- Computing Technology Industry Association -- Information System Audit and Control Association -- Information System Security Association -- SANS Institute -- Disaster Recovery Institute, International -- Business Continuity Institute -- Deciding Among Certifications -- Codes of Ethics -- Further Reading -- Critical Thinking Exercises -- Chapter 6 Information Assurance Management System -- Security Considerations for the Information Asset Life Cycle
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Computer security
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Data protection
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Information storage and retrieval systems
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Sécurité informatique
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Systèmes d'information
|x Sécurité
|x Mesures
|v Guides, manuels, etc.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information storage and retrieval systems
|x Security measures
|2 fast
|
655 |
|
7 |
|a handbooks.
|2 aat
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals.
|2 lcgft
|
655 |
|
7 |
|a Guides et manuels.
|2 rvmgf
|
700 |
1 |
|
|a Hernandez, Steven.
|
776 |
0 |
8 |
|i Print version:
|a Schou, Corey.
|t Information Assurance Handbook: Effective Computer Security and Risk Management Strategies.
|d : McGraw-Hill Education, ©2014
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071821650/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00072511
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6257064
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16841030
|
994 |
|
|
|a 92
|b IZTAP
|