Information security management principles

In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edit...

Full description

Saved in:
Bibliographic Details
Main Author: Alexander, David (Information security practitioner)
Other Authors: Finch, Amanda., Sutton, David (Information security practitioner), Taylor, Andy.
Format: eBook
Language: English
Published: Swindon, U.K. : BCS Learning & Development Ltd., 2013.
Subjects:
ISBN: 9781780171760
1780171765
9781628702590
1628702591
1780171757
9781780171753
9781780171777
1780171773
9781780171784
1780171781
Physical Description: 1 online resource (xvi, 208 pages) : illustrations

Cover

Table of contents

LEADER 05215cam a2200553 a 4500
001 kn-ocn854569528
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 130715s2013 enka ob 001 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d OCLCO  |d N$T  |d KNOVL  |d OCLCF  |d COO  |d YDXCP  |d EBLCP  |d UMI  |d DEBSZ  |d B24X7  |d OCLCO  |d OCLCQ  |d OCLCO  |d TJC  |d OCLCQ  |d OCLCO  |d Z5A  |d ZCU  |d MERUC  |d OCLCQ  |d OCLCA  |d ICG  |d CNNOR  |d STF  |d MERER  |d CUY  |d CEF  |d ERL  |d OCLCQ  |d LVT  |d AGLDB  |d OCLCQ  |d DKC  |d OCLCQ  |d CNCEN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ  |d OCLCL  |d SXB 
020 |a 9781780171760  |q (electronic bk.) 
020 |a 1780171765  |q (electronic bk.) 
020 |a 9781628702590  |q (electronic bk.) 
020 |a 1628702591  |q (electronic bk.) 
020 |a 1780171757 
020 |a 9781780171753 
020 |a 9781780171777  |q (ePUB) 
020 |a 1780171773  |q (ePUB) 
020 |a 9781780171784  |q (Kindle) 
020 |a 1780171781  |q (Kindle) 
020 |z 9781780171753 
024 8 |a 9781780171753 
035 |a (OCoLC)854569528  |z (OCoLC)851971957  |z (OCoLC)858312198  |z (OCoLC)907208076  |z (OCoLC)988807173  |z (OCoLC)1076625903  |z (OCoLC)1104501689  |z (OCoLC)1105770860 
100 1 |a Alexander, David  |c (Information security practitioner)  |1 https://id.oclc.org/worldcat/entity/E39PCjyBbQBttP9bYRTYMygmMP 
245 1 0 |a Information security management principles /  |c Andy Taylor (editor), David Alexander, Amanda Finch, David Sutton. 
260 |a Swindon, U.K. :  |b BCS Learning & Development Ltd.,  |c 2013. 
300 |a 1 online resource (xvi, 208 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Copyright; CONTENTS; LIST OF FIGURES AND TABLES; AUTHORS; ACKNOWLEDGEMENTS; ABBREVIATIONS; PREFACE; 1 INFORMATION SECURITY PRINCIPLES; CONCEPTS AND DEFINITIONS; THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 2 INFORMATION RISK; THREATS TO, AND VULNERABILITIES OF, INFORMATION SYSTEMS; RISK MANAGEMENT; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 3 INFORMATION SECURITY FRAMEWORK; ORGANISATIONS AND RESPONSIBILITIES; ORGANISATIONAL POLICY, STANDARDS AND PROCEDURES; INFORMATION SECURITY GOVERNANCE; INFORMATION SECURITY IMPLEMENTATION. 
505 8 |a Security incident managementlegal framework; security standards and procedures; pointers for activities in this chapter; 4 procedural and people security controls; people; user access controls; training and awareness; pointers for activities in this chapter; 5 technical security controls; protection from malicious software; networks and communications; external services; cloud computing; it infrastructure; pointers for activities in this chapter; 6 software development and life cycle; testing, audit and review; systems development and support; pointers for activities in this chapter. 
505 8 |a 7 physical and environmental securitylearning outcomes; general controls; physical security; technical security; procedural security; protection of equipment; processes to handle intruder alerts; clear screen and desk policy; moving property on and off site; procedures for secure disposal; security requirements in delivery and loading areas; pointers for activities in this chapter; 8 disaster recovery and business continuity management; learning outcomes; dr/bcp, risk assessment and impact analysis; writing and implementing plans; documentation, maintenance and testing. 
505 8 |a LINKS TO MANAGED SERVICE PROVISION AND OUTSOURCINGSECURE OFF-SITE STORAGE OF VITAL MATERIAL; INVOLVEMENT OF PERSONNEL, SUPPLIERS AND IT SYSTEMS PROVIDERS; SECURITY INCIDENT MANAGEMENT; COMPLIANCE WITH STANDARDS; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; 9 OTHER TECHNICAL ASPECTS; INVESTIGATIONS AND FORENSICS; ROLE OF CRYPTOGRAPHY; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; APPENDIX A; GLOSSARY; INDEX; Back Cover. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Finch, Amanda. 
700 1 |a Sutton, David  |c (Information security practitioner)  |1 https://id.oclc.org/worldcat/entity/E39PCjqKvFbKgyXgbrRKCkcmv3 
700 1 |a Taylor, Andy. 
776 0 8 |i Print version:  |a Taylor, Andy.  |t Information Security Management Principles.  |d Swindon : BCS Learning & Development Limited, ©2013  |z 9781780171753 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpISMPE001/information-security-management?kpromoter=marc  |y Full text