Once more unto the breach : managing information security in an uncertain world /
The challenges you face as an information security manager (ISM) have increased enormously since the first edition of this title was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been a...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridgeshire, England :
IT Governance Publishing,
2015.
|
Edición: | Second edition. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn905916618 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 150310t20152015enk ob 000 0 eng d | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d OCLCO |d JSTOR |d OCLCO |d OCLCF |d OCLCO |d STF |d COO |d OCLCO |d YDXCP |d OCLCQ |d LIV |d VT2 |d IOG |d LVT |d UX1 |d BRF |d DST |d OCLCO |d OCLCQ |d EBLCP |d DEBSZ |d IDB |d MERUC |d QGK |d UMI |d CEF |d UAB |d VLY |d OCLCQ |d OCLCO |d DEGRU | ||
019 | |a 911246695 |a 923645870 |a 928193722 |a 928751171 |a 948892988 |a 1162121318 |a 1175640060 |a 1300447098 |a 1303340125 |a 1303456499 |a 1316316633 |a 1327747871 |a 1328377751 |a 1395682334 | ||
020 | |a 9781849287098 |q (electronic bk.) | ||
020 | |a 1849287090 |q (electronic bk.) | ||
020 | |a 9781849287104 |q (electronic bk.) | ||
020 | |a 1849287104 |q (electronic bk.) | ||
020 | |z 9781849287081 |q (paperback) | ||
029 | 1 | |a AU@ |b 000054924429 | |
029 | 1 | |a AU@ |b 000056097601 | |
029 | 1 | |a CHBIS |b 010446346 | |
029 | 1 | |a CHVBK |b 357792351 | |
029 | 1 | |a DEBSZ |b 446072087 | |
029 | 1 | |a GBVCP |b 89717044X | |
035 | |a (OCoLC)905916618 |z (OCoLC)911246695 |z (OCoLC)923645870 |z (OCoLC)928193722 |z (OCoLC)928751171 |z (OCoLC)948892988 |z (OCoLC)1162121318 |z (OCoLC)1175640060 |z (OCoLC)1300447098 |z (OCoLC)1303340125 |z (OCoLC)1303456499 |z (OCoLC)1316316633 |z (OCoLC)1327747871 |z (OCoLC)1328377751 |z (OCoLC)1395682334 | ||
037 | |a 22573/ctt14zcz3c |b JSTOR | ||
050 | 4 | |a HF5548.37 |b .S566 2015eb | |
072 | 7 | |a COM000000 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 658.478 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Simmons, Andrea C., |e author. | |
245 | 1 | 0 | |a Once more unto the breach : |b managing information security in an uncertain world / |c Andrea C. Simmons. |
250 | |a Second edition. | ||
264 | 1 | |a Cambridgeshire, England : |b IT Governance Publishing, |c 2015. | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (237 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
504 | |a Includes bibliographical references. | ||
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed March 9, 2015). | |
520 | |a The challenges you face as an information security manager (ISM) have increased enormously since the first edition of this title was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. In this revised edition Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and using the role of project manager on a programme of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. You'll discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. -- |c Edited summary from book. | ||
505 | 0 | |a Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction. | |
505 | 8 | |a Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings. | |
505 | 8 | |a Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy. | |
505 | 8 | |a Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary. | |
505 | 8 | |a Chapter 11: June: What the auditors shouldn't knowInternal audit has history; Increasing and varied security incidents; Security awareness theme; Chapter summary; Chapter 12: July: Journey's end ... and conclusion; Returning to the lessons learnt; The life of an information security manager; Things I haven't spent a lot of time on; Closing thoughts; And finally, be an active professional; Appendix 1: Security Awareness Themes; Appendix 2: ISM Activities; Appendix 3: Resources; ITG Resources. | |
546 | |a English. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a JSTOR |b Books at JSTOR Demand Driven Acquisitions (DDA) | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a information technology. |2 aat | |
650 | 7 | |a COMPUTERS |x General. |2 bisacsh | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
776 | 0 | 8 | |i Print version: |a Simmons, Andrea C. |t Once more unto the breach : managing information security in an uncertain world. |b Second edition. |d Cambridgeshire, England : IT Governance Publishing, ©2015 |h 237 pages |z 9781849287081 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=2069450 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781849287098/?ar |z Texto completo |
936 | |a BATCHLOAD | ||
938 | |a De Gruyter |b DEGR |n 9781849287098 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL2069450 | ||
938 | |a YBP Library Services |b YANK |n 12302807 | ||
938 | |a YBP Library Services |b YANK |n 12477410 | ||
994 | |a 92 |b IZTAP |