04545nam 22006853u 450 991078734320332120210111115734.01-84928-710-4(CKB)3710000000358091(EBL)2069450(SSID)ssj0001471686(PQKBManifestationID)11851243(PQKBTitleCode)TC0001471686(PQKBWorkID)11424287(PQKB)11774954(MiAaPQ)EBC2069450(EXLCZ)99371000000035809120150622d2015|||| u|| |engur|n|---|||||txtccrOnce more unto the Breach[electronic resource] Managing information security in an uncertain world2nd ed.Ely IT Governance Ltd20151 online resource (273 p.)Description based upon print version of record.1-84928-708-2 Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; IntroductionInformation security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findingsPhysical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacyOther security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summaryBusiness enterprises -- Computer networks -- Security measuresBusiness enterprises -- Information technology -- Security measuresComputer networks -- Security measuresComputer security -- ManagementData protectionInformation technology -- Security measuresCommerceHILCCBusiness & EconomicsHILCCMarketing & SalesHILCCBusiness enterprises -- Computer networks -- Security measures.Business enterprises -- Information technology -- Security measures.Computer networks -- Security measures.Computer security -- Management.Data protection.Information technology -- Security measures.CommerceBusiness & EconomicsMarketing & Sales005.8Simmons Andrea1500004AU-PeELAU-PeELAU-PeELBOOK9910787343203321Once more unto the Breach3726466UNINA