Information security management principles
In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edit...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , |
Format: | eBook |
Language: | English |
Published: |
Swindon, U.K. :
BCS Learning & Development Ltd.,
2013.
|
Subjects: | |
ISBN: | 9781780171760 1780171765 9781628702590 1628702591 1780171757 9781780171753 9781780171777 1780171773 9781780171784 1780171781 |
Physical Description: | 1 online resource (xvi, 208 pages) : illustrations |
LEADER | 05215cam a2200553 a 4500 | ||
---|---|---|---|
001 | kn-ocn854569528 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 130715s2013 enka ob 001 0 eng d | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d OCLCO |d N$T |d KNOVL |d OCLCF |d COO |d YDXCP |d EBLCP |d UMI |d DEBSZ |d B24X7 |d OCLCO |d OCLCQ |d OCLCO |d TJC |d OCLCQ |d OCLCO |d Z5A |d ZCU |d MERUC |d OCLCQ |d OCLCA |d ICG |d CNNOR |d STF |d MERER |d CUY |d CEF |d ERL |d OCLCQ |d LVT |d AGLDB |d OCLCQ |d DKC |d OCLCQ |d CNCEN |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d SXB | ||
020 | |a 9781780171760 |q (electronic bk.) | ||
020 | |a 1780171765 |q (electronic bk.) | ||
020 | |a 9781628702590 |q (electronic bk.) | ||
020 | |a 1628702591 |q (electronic bk.) | ||
020 | |a 1780171757 | ||
020 | |a 9781780171753 | ||
020 | |a 9781780171777 |q (ePUB) | ||
020 | |a 1780171773 |q (ePUB) | ||
020 | |a 9781780171784 |q (Kindle) | ||
020 | |a 1780171781 |q (Kindle) | ||
020 | |z 9781780171753 | ||
024 | 8 | |a 9781780171753 | |
035 | |a (OCoLC)854569528 |z (OCoLC)851971957 |z (OCoLC)858312198 |z (OCoLC)907208076 |z (OCoLC)988807173 |z (OCoLC)1076625903 |z (OCoLC)1104501689 |z (OCoLC)1105770860 | ||
100 | 1 | |a Alexander, David |c (Information security practitioner) |1 https://id.oclc.org/worldcat/entity/E39PCjyBbQBttP9bYRTYMygmMP | |
245 | 1 | 0 | |a Information security management principles / |c Andy Taylor (editor), David Alexander, Amanda Finch, David Sutton. |
260 | |a Swindon, U.K. : |b BCS Learning & Development Ltd., |c 2013. | ||
300 | |a 1 online resource (xvi, 208 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Copyright; CONTENTS; LIST OF FIGURES AND TABLES; AUTHORS; ACKNOWLEDGEMENTS; ABBREVIATIONS; PREFACE; 1 INFORMATION SECURITY PRINCIPLES; CONCEPTS AND DEFINITIONS; THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 2 INFORMATION RISK; THREATS TO, AND VULNERABILITIES OF, INFORMATION SYSTEMS; RISK MANAGEMENT; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 3 INFORMATION SECURITY FRAMEWORK; ORGANISATIONS AND RESPONSIBILITIES; ORGANISATIONAL POLICY, STANDARDS AND PROCEDURES; INFORMATION SECURITY GOVERNANCE; INFORMATION SECURITY IMPLEMENTATION. | |
505 | 8 | |a Security incident managementlegal framework; security standards and procedures; pointers for activities in this chapter; 4 procedural and people security controls; people; user access controls; training and awareness; pointers for activities in this chapter; 5 technical security controls; protection from malicious software; networks and communications; external services; cloud computing; it infrastructure; pointers for activities in this chapter; 6 software development and life cycle; testing, audit and review; systems development and support; pointers for activities in this chapter. | |
505 | 8 | |a 7 physical and environmental securitylearning outcomes; general controls; physical security; technical security; procedural security; protection of equipment; processes to handle intruder alerts; clear screen and desk policy; moving property on and off site; procedures for secure disposal; security requirements in delivery and loading areas; pointers for activities in this chapter; 8 disaster recovery and business continuity management; learning outcomes; dr/bcp, risk assessment and impact analysis; writing and implementing plans; documentation, maintenance and testing. | |
505 | 8 | |a LINKS TO MANAGED SERVICE PROVISION AND OUTSOURCINGSECURE OFF-SITE STORAGE OF VITAL MATERIAL; INVOLVEMENT OF PERSONNEL, SUPPLIERS AND IT SYSTEMS PROVIDERS; SECURITY INCIDENT MANAGEMENT; COMPLIANCE WITH STANDARDS; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; 9 OTHER TECHNICAL ASPECTS; INVESTIGATIONS AND FORENSICS; ROLE OF CRYPTOGRAPHY; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; APPENDIX A; GLOSSARY; INDEX; Back Cover. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources. | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Data protection. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Finch, Amanda. | |
700 | 1 | |a Sutton, David |c (Information security practitioner) |1 https://id.oclc.org/worldcat/entity/E39PCjqKvFbKgyXgbrRKCkcmv3 | |
700 | 1 | |a Taylor, Andy. | |
776 | 0 | 8 | |i Print version: |a Taylor, Andy. |t Information Security Management Principles. |d Swindon : BCS Learning & Development Limited, ©2013 |z 9781780171753 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpISMPE001/information-security-management?kpromoter=marc |y Full text |