LEADER 02696nam 22005413u 450 001 9910783281503321 005 20210108051930.0 010 $a1-4175-2032-9 010 $a1-58053-703-0 035 $a(CKB)1000000000023481 035 $a(EBL)231645 035 $a(OCoLC)437146236 035 $a(SSID)ssj0000225736 035 $a(PQKBManifestationID)11174089 035 $a(PQKBTitleCode)TC0000225736 035 $a(PQKBWorkID)10230991 035 $a(PQKB)10194813 035 $a(MiAaPQ)EBC231645 035 $a(EXLCZ)991000000000023481 100 $a20130418d2004|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 12$aA Practical Guide to Managing Information Security$b[electronic resource] 210 $aNorwood $cArtech House$d2004 215 $a1 online resource (280 p.) 300 $aDescription based upon print version of record. 311 $a1-58053-702-2 327 $aA Practical Guide to Managing Information Security; Contents vii; Preface xiii; Acknowledgments xvii; CHAPTER 1 The need for a proactive approach 1; CHAPTER 2 Management techniques 23; CHAPTER 3 Technical tools 47; CHAPTER 4 A proactive approach: Overview 85; CHAPTER 5 The information-security strategy 109; CHAPTER 6 Policy and standards 131; CHAPTER 7 Process design and implementation 155; CHAPTER 8 Building an IT security architecture 181; CHAPTER 9 Creating a security-minded culture 215; Appendix: Fast risk analysis 241; About the author 249; Index 251 330 $aThis groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need to align the information security process as a whole with the requirements of the modern enterprise, which involves empowering business managers to manage information security-related risk. Throughout, the book places emphasis on the use of simple, p 606 $aComputer security 606 $aComputer Science$2HILCC 606 $aEngineering & Applied Sciences$2HILCC 615 4$aComputer security. 615 7$aComputer Science 615 7$aEngineering & Applied Sciences 676 $a658.4/78 676 $a658.472 700 $aPurser$b Steve$01507627 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910783281503321 996 $aA Practical Guide to Managing Information Security$93738523 997 $aUNINA LEADER 00959nam0-2200325---450 001 990008285200403321 005 20251128102640.0 010 $a88-272-0207-2 035 $a000828520 035 $aFED01000828520 035 $a(Aleph)000828520FED01 035 $a000828520 100 $a20060228d1993----km-y0itay50------ba 101 1 $aita 102 $aIT 105 $aa-------001yy 200 1 $a<>medicina cinese$eprincipi medici e pratica terapeutica$fCarl Hermann Hempen$gtraduzione di Nunzio Piccolo 210 $aRoma$cEdizioni mediterranee$d1993 215 $a244 p.$cill.$d24 cm 610 0 $aMedicina cinese 676 $a610.951$v21$zita 700 1$aHempen,$bCarl Hermann$0291384 702 1$aPiccolo,$bNunzio 801 0$aIT$bUNINA$c20060228$gRICA$2UNIMARC 901 $aBK 912 $a990008285200403321 952 $a199.622 HEMC 01$bBibl. 53034$fFLFBC 959 $aFLFBC 996 $aMedicina cinese$9740740 997 $aUNINA