Cargando…

The information systems security officer's guide : establishing and managing a cyber security program /

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on estab...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kovacich, Gerald L. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Butterworth-Heinemann, 2016.
Edición:Third edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn935112540
003 OCoLC
005 20231120112046.0
006 m o d
007 cr cnu|||unuuu
008 160118s2016 mau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDXCP  |d OCLCF  |d OPELS  |d UIU  |d EBLCP  |d COO  |d D6H  |d IDB  |d MERUC  |d LIV  |d OCLCQ  |d VT2  |d OCLCO  |d U3W  |d OCLCA  |d WRM  |d KSU  |d OCLCQ  |d WYU  |d UAB  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 935272331  |a 935919761  |a 1005778167  |a 1008941462 
020 |a 9780128023792  |q (electronic bk.) 
020 |a 0128023791  |q (electronic bk.) 
020 |z 9780128021903 
020 |z 012802190X 
035 |a (OCoLC)935112540  |z (OCoLC)935272331  |z (OCoLC)935919761  |z (OCoLC)1005778167  |z (OCoLC)1008941462 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 000000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Kovacich, Gerald L.,  |e author. 
245 1 4 |a The information systems security officer's guide :  |b establishing and managing a cyber security program /  |c Gerald L. Kovacich. 
250 |a Third edition. 
264 1 |a Waltham, MA :  |b Butterworth-Heinemann,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Vendor-supplied metadata. 
520 |a The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment. 
505 0 |a Front Cover; The Information Systems Security Officer's Guide; Copyright; Dedication; Contents; ABOUT THE AUTHOR; OTHER BOOKS AUTHORED OR COAUTHORED BY DR. GERALD L. KOVACICH; Preface; Acknowledgments; INTRODUCTION; WHAT OTHER CYBER SECURITY PROFESSIONALS HAVE TO SAY; William C. Boni; Ed Halibozek; Dr. Andy Jones; Steve Lutz; I -- The Working Environment of the Cyber Security Officer; 1 -- Understanding the Past and Present Cyber-Information World Environment; AH, THE GOOD OL' DAYS!; Understanding Your Information-Driven Environment; GLOBAL INFORMATION INFRASTRUCTURE. 
505 8 |a NATIONAL INFORMATION INFRASTRUCTURE"Future Shock"; Road Map for the Internet; The Internet: No Traffic Controls; What Has Been the Impact of the Internet?; Organizational Impacts; Using the Internet to Share Information; CHANGING CRIMINAL JUSTICE SYSTEMS; THE HUMAN FACTOR; Laws, Regulations, Standards, and Legal Issues; SUMMARY; 2 -- Understanding the Past and Present Global Business and Management Environment; THE CHANGING BUSINESS AND GOVERNMENT ENVIRONMENTS; UNDERSTANDING THE BUSINESS ENVIRONMENT; MANAGEMENT RESPONSIBILITIES AND COMMUNICATING WITH MANAGEMENT. 
505 8 |a CREATING A COMPETITIVE ADVANTAGE THROUGH A CYBER SECURITY PROGRAMThe Cyber Security Officer as a Business Manager; SERVICE, SUPPORT, AND A BUSINESS ORIENTATION; BUSINESS MANAGERS AND CYBER SECURITY; WHAT COMPANY MANAGERS SHOULD ASK OF THEIR CYBER SECURITY PROFESSIONALS; WHAT CYBER SECURITY PROFESSIONALS SHOULD DO; QUESTIONS TO CONSIDER; SUMMARY; 3 -- An Overview of Related World Views of Cyber Security; EVOLUTION OF LAWS, STANDARDS, POLICIES, AND PROCEDURES; GLOBAL VIA THE UN; THE EU; International Security in Cyberspace; Internet Governance Developments in 2015. 
505 8 |a U.S.-EU Cyber Security-Related CooperationASIA; SOUTH AMERICA; AFRICA; UNITED STATES; CNCI Initiative Details; SUMMARY; 4 -- A Glimpse at the History of Technology; WHAT IS TECHNOLOGY?; FROM CAVE MAN TO CYBER SECURITY PROFESSIONAL AND INFORMATION WARRIOR; REVOLUTIONS AND EVOLUTIONS IN HIGH TECHNOLOGY; FROM THE TWENTIETH CENTURY TO TODAY: TECHNOLOGY AND THE ADVENT/ F HIGH TECHNOLOGY; Other Significant Twentieth-Century Technological Developments and Events; High-Tech: A Product, a Process, or Both?; The Trade Association: AEA; The Consulting Group: RFA; Information Provider: One Source. 
505 8 |a The Research Group: BLSThe Microprocessor; Moore's Law; Other Significant Twentieth Century High-Technology/ evelopments and Events; THE INTERNET; THE HIGH-TECHNOLOGY-DRIVEN PHENOMENON; FASTER AND MORE MASSIVE HIGH-TECHNOLOGY-DRIVEN COMMUNICATIONS; THE BENEFICIAL EFFECT OF HACKER TOOLS AND OTHER MALICIOUS SOFTWARE ON/ ETWORK SECURITY WITH DUAL ROLES AS CYBER SECURITY TOOLS; OTHER HIGH-TECHNOLOGY TOOLS IN CYBER SECURITY; WELCOME TO THE TWENTY-FIRST-CENTURY TECHNOLOGY; SUMMARY; 5 -- Understanding Today's Threats in the Cyber Vapor-"War Stories" from the Front Lines1. 
504 |a Includes bibliographical references and index. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 7 |a COMPUTER SCIENCE/General.  |2 bisacsh 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
776 0 8 |i Print version:  |z 9780128021903  |z 012802190X  |w (OCoLC)922911114 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128021903  |z Texto completo