Cargando…

Once more unto the breach : managing information security in an uncertain world /

The challenges you face as an information security manager (ISM) have increased enormously since the first edition of this title was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Simmons, Andrea C. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridgeshire, England : IT Governance Publishing, 2015.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn905916618
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 150310t20152015enk ob 000 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d JSTOR  |d OCLCO  |d OCLCF  |d OCLCO  |d STF  |d COO  |d OCLCO  |d YDXCP  |d OCLCQ  |d LIV  |d VT2  |d IOG  |d LVT  |d UX1  |d BRF  |d DST  |d OCLCO  |d OCLCQ  |d EBLCP  |d DEBSZ  |d IDB  |d MERUC  |d QGK  |d UMI  |d CEF  |d UAB  |d VLY  |d OCLCQ  |d OCLCO  |d DEGRU 
019 |a 911246695  |a 923645870  |a 928193722  |a 928751171  |a 948892988  |a 1162121318  |a 1175640060  |a 1300447098  |a 1303340125  |a 1303456499  |a 1316316633  |a 1327747871  |a 1328377751  |a 1395682334 
020 |a 9781849287098  |q (electronic bk.) 
020 |a 1849287090  |q (electronic bk.) 
020 |a 9781849287104  |q (electronic bk.) 
020 |a 1849287104  |q (electronic bk.) 
020 |z 9781849287081  |q (paperback) 
029 1 |a AU@  |b 000054924429 
029 1 |a AU@  |b 000056097601 
029 1 |a CHBIS  |b 010446346 
029 1 |a CHVBK  |b 357792351 
029 1 |a DEBSZ  |b 446072087 
029 1 |a GBVCP  |b 89717044X 
035 |a (OCoLC)905916618  |z (OCoLC)911246695  |z (OCoLC)923645870  |z (OCoLC)928193722  |z (OCoLC)928751171  |z (OCoLC)948892988  |z (OCoLC)1162121318  |z (OCoLC)1175640060  |z (OCoLC)1300447098  |z (OCoLC)1303340125  |z (OCoLC)1303456499  |z (OCoLC)1316316633  |z (OCoLC)1327747871  |z (OCoLC)1328377751  |z (OCoLC)1395682334 
037 |a 22573/ctt14zcz3c  |b JSTOR 
050 4 |a HF5548.37  |b .S566 2015eb 
072 7 |a COM000000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 658.478  |2 23 
049 |a UAMI 
100 1 |a Simmons, Andrea C.,  |e author. 
245 1 0 |a Once more unto the breach :  |b managing information security in an uncertain world /  |c Andrea C. Simmons. 
250 |a Second edition. 
264 1 |a Cambridgeshire, England :  |b IT Governance Publishing,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource (237 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from PDF title page (ebrary, viewed March 9, 2015). 
520 |a The challenges you face as an information security manager (ISM) have increased enormously since the first edition of this title was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. In this revised edition Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and using the role of project manager on a programme of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed. You'll discover the importance of having a camera with you at all times. For too long, security has been seen as more of an inhibitor than an enabler. --  |c Edited summary from book. 
505 0 |a Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction. 
505 8 |a Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings. 
505 8 |a Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy. 
505 8 |a Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary. 
505 8 |a Chapter 11: June: What the auditors shouldn't knowInternal audit has history; Increasing and varied security incidents; Security awareness theme; Chapter summary; Chapter 12: July: Journey's end ... and conclusion; Returning to the lessons learnt; The life of an information security manager; Things I haven't spent a lot of time on; Closing thoughts; And finally, be an active professional; Appendix 1: Security Awareness Themes; Appendix 2: ISM Activities; Appendix 3: Resources; ITG Resources. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a information technology.  |2 aat 
650 7 |a COMPUTERS  |x General.  |2 bisacsh 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Simmons, Andrea C.  |t Once more unto the breach : managing information security in an uncertain world.  |b Second edition.  |d Cambridgeshire, England : IT Governance Publishing, ©2015  |h 237 pages  |z 9781849287081 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=2069450  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849287098/?ar  |z Texto completo 
936 |a BATCHLOAD 
938 |a De Gruyter  |b DEGR  |n 9781849287098 
938 |a EBL - Ebook Library  |b EBLB  |n EBL2069450 
938 |a YBP Library Services  |b YANK  |n 12302807 
938 |a YBP Library Services  |b YANK  |n 12477410 
994 |a 92  |b IZTAP