LEADER 00833nam0-22002891i-450- 001 990001432660403321 010 $a0-521-49692-6 035 $a000143266 035 $aFED01000143266 035 $a(Aleph)000143266FED01 035 $a000143266 100 $a20000920d1996----km-y0itay50------ba 101 0 $aeng 200 1 $a<>Principles of Mathematics Revisited$fJaakko Hintikka 210 $aCambridge$cCambridge University Press$d1996 215 $axii, 288 p.$d22 cm 610 0 $aFondamenti della logica matematica e probabilità 676 $a519 700 1$aHintikka,$bJaakko$045116 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001432660403321 952 $a4A-181$b5943$fFI1 959 $aFI1 996 $aPrinciples of Mathematics Revisited$9374892 997 $aUNINA DB $aING01 LEADER 04568nam 2200721 a 450 001 9911006542203321 005 20240313233414.0 010 $a9781628702590 010 $a1628702591 010 $a9781780171760 010 $a1780171765 035 $a(CKB)2670000000387996 035 $a(EBL)1213992 035 $a(OCoLC)851971957 035 $a(SSID)ssj0001139622 035 $a(PQKBManifestationID)11758216 035 $a(PQKBTitleCode)TC0001139622 035 $a(PQKBWorkID)11214250 035 $a(PQKB)11203729 035 $a(Au-PeEL)EBL1213992 035 $a(CaPaEBR)ebr10723956 035 $a(CaONFJC)MIL551952 035 $a(OCoLC)854569528 035 $a(CaSebORM)9781780171753 035 $a(MiAaPQ)EBC1213992 035 $a(OCoLC)858312198 035 $a(OCoLC)ocn858312198 035 $a(EXLCZ)992670000000387996 100 $a20130715d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation security management principles /$fAndy Taylor (editor), David Alexander, Amanda Finch, David Sutton 205 $a2nd ed. 210 $aSwindon, U.K. $cBCS Learning & Development Ltd.$d2013 215 $a1 online resource (227 p.) 300 $aDescription based upon print version of record. 311 08$a9781780171753 311 08$a1780171757 320 $aIncludes bibliographical references and index. 327 $aCopyright; CONTENTS; LIST OF FIGURES AND TABLES; AUTHORS; ACKNOWLEDGEMENTS; ABBREVIATIONS; PREFACE; 1 INFORMATION SECURITY PRINCIPLES; CONCEPTS AND DEFINITIONS; THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 2 INFORMATION RISK; THREATS TO, AND VULNERABILITIES OF, INFORMATION SYSTEMS; RISK MANAGEMENT; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 3 INFORMATION SECURITY FRAMEWORK; ORGANISATIONS AND RESPONSIBILITIES; ORGANISATIONAL POLICY, STANDARDS AND PROCEDURES; INFORMATION SECURITY GOVERNANCE; INFORMATION SECURITY IMPLEMENTATION 327 $aSECURITY INCIDENT MANAGEMENTLEGAL FRAMEWORK; SECURITY STANDARDS AND PROCEDURES; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 4 PROCEDURAL AND PEOPLE SECURITY CONTROLS; PEOPLE; USER ACCESS CONTROLS; TRAINING AND AWARENESS; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 5 TECHNICAL SECURITY CONTROLS; PROTECTION FROM MALICIOUS SOFTWARE; NETWORKS AND COMMUNICATIONS; EXTERNAL SERVICES; CLOUD COMPUTING; IT INFRASTRUCTURE; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 6 SOFTWARE DEVELOPMENT AND LIFE CYCLE; TESTING, AUDIT AND REVIEW; SYSTEMS DEVELOPMENT AND SUPPORT; POINTERS FOR ACTIVITIES IN THIS CHAPTER 327 $a7 PHYSICAL AND ENVIRONMENTAL SECURITYLEARNING OUTCOMES; GENERAL CONTROLS; PHYSICAL SECURITY; TECHNICAL SECURITY; PROCEDURAL SECURITY; PROTECTION OF EQUIPMENT; PROCESSES TO HANDLE INTRUDER ALERTS; CLEAR SCREEN AND DESK POLICY; MOVING PROPERTY ON AND OFF SITE; PROCEDURES FOR SECURE DISPOSAL; SECURITY REQUIREMENTS IN DELIVERY AND LOADING AREAS; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 8 DISASTER RECOVERY AND BUSINESS CONTINUITY MANAGEMENT; LEARNING OUTCOMES; DR/BCP, RISK ASSESSMENT AND IMPACT ANALYSIS; WRITING AND IMPLEMENTING PLANS; DOCUMENTATION, MAINTENANCE AND TESTING 327 $aLINKS TO MANAGED SERVICE PROVISION AND OUTSOURCINGSECURE OFF-SITE STORAGE OF VITAL MATERIAL; INVOLVEMENT OF PERSONNEL, SUPPLIERS AND IT SYSTEMS PROVIDERS; SECURITY INCIDENT MANAGEMENT; COMPLIANCE WITH STANDARDS; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; 9 OTHER TECHNICAL ASPECTS; INVESTIGATIONS AND FORENSICS; ROLE OF CRYPTOGRAPHY; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; APPENDIX A; GLOSSARY; INDEX; Back Cover 330 $aIn today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources. 606 $aComputer security$xManagement 606 $aData protection 615 0$aComputer security$xManagement. 615 0$aData protection. 676 $a005.8068 700 $aAlexander$b David$0276132 701 $aFinch$b Amanda$01018191 701 $aSutton$b David$064524 701 $aTaylor$b Andy$01018190 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911006542203321 996 $aInformation Security Management Principles$92393079 997 $aUNINA