|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1006894021 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
171020s2017 cau ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d STF
|d OCLCA
|d COO
|d UOK
|d CEF
|d KSU
|d VT2
|d OCLCQ
|d WYU
|d C6I
|d UAB
|d OCLCQ
|d CZL
|d OCLCO
|d OCLCQ
|
020 |
|
|
|z 9781491996904
|
020 |
|
|
|z 9781491996911
|
029 |
1 |
|
|a GBVCP
|b 1014936705
|
035 |
|
|
|a (OCoLC)1006894021
|
037 |
|
|
|a CL0500000904
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
082 |
1 |
4 |
|a [E]
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jackson, Craig,
|e author.
|
245 |
1 |
0 |
|a Security from first principles :
|b a practical guide to the information security practice principles /
|c Craig Jackson, Scott Russell, and Susan Sons.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed October 17, 2017).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Today, a spate of best practices guides, checklists, policies, and standards pervade nearly every part of information security practice. Some are well thought out and well written, others less so. How do you evaluate them? This report explores the Information Security Practice Principles on which all security operates. Created by analysts at Indiana University's Center for Applied Cybersecurity Research, these Principles enable you to assess any guide, policy, or standard--and even create new ones. The Principles provide a framework to help you reason through security implications of devices and systems, regardless of how novel or new that technology may be. You'll be able to analyze and understand security policy, technological controls, and physical security, and assess vendor solutions. Written by the Principle's authors, this report walks InfoSec professionals, managers and executives, and IT engineers through seven principles--Comprehensivity, Opportunity, Rigor, Minimization, Compartmentation, Fault Tolerance, and Proportionality--and explains how they apply in both technical and human/policy contexts. Discover why many organizations have approached the Center for Applied Cybersecurity Research when they have questions about technologies, networks, and organizational structures that are unconventional, complex, or unexplored.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Access control.
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Russell, Scott,
|e author.
|
700 |
1 |
|
|a Sons, Susan,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Jackson, Craig.
|t Security from first principles : a practical guide to the information security practice principles.
|d Sebastopol, California : O'Reilly Media, 2017
|z 9781491996904
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491996911/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|