LEADER 04578nam 22006973u 450 001 9910460203303321 005 20210111115734.0 010 $a1-84928-710-4 035 $a(CKB)3710000000358091 035 $a(EBL)2069450 035 $a(SSID)ssj0001471686 035 $a(PQKBManifestationID)11851243 035 $a(PQKBTitleCode)TC0001471686 035 $a(PQKBWorkID)11424287 035 $a(PQKB)11774954 035 $a(MiAaPQ)EBC2069450 035 $a(EXLCZ)993710000000358091 100 $a20150622d2015|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aOnce more unto the Breach$b[electronic resource] $eManaging information security in an uncertain world 205 $a2nd ed. 210 $aEly $cIT Governance Ltd$d2015 215 $a1 online resource (273 p.) 300 $aDescription based upon print version of record. 311 $a1-84928-708-2 327 $aCover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction 327 $aInformation security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings 327 $aPhysical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy 327 $aOther security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary 606 $aBusiness enterprises -- Computer networks -- Security measures 606 $aBusiness enterprises -- Information technology -- Security measures 606 $aComputer networks -- Security measures 606 $aComputer security -- Management 606 $aData protection 606 $aInformation technology -- Security measures 606 $aCommerce$2HILCC 606 $aBusiness & Economics$2HILCC 606 $aMarketing & Sales$2HILCC 608 $aElectronic books. 615 4$aBusiness enterprises -- Computer networks -- Security measures. 615 4$aBusiness enterprises -- Information technology -- Security measures. 615 4$aComputer networks -- Security measures. 615 4$aComputer security -- Management. 615 4$aData protection. 615 4$aInformation technology -- Security measures. 615 7$aCommerce 615 7$aBusiness & Economics 615 7$aMarketing & Sales 676 $a005.8 700 $aSimmons$b Andrea$0951161 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910460203303321 996 $aOnce more unto the Breach$92150221 997 $aUNINA