LEADER 02696nam 22005413u 450 001 9910783281503321 005 20210108051930.0 010 $a1-4175-2032-9 010 $a1-58053-703-0 035 $a(CKB)1000000000023481 035 $a(EBL)231645 035 $a(OCoLC)437146236 035 $a(SSID)ssj0000225736 035 $a(PQKBManifestationID)11174089 035 $a(PQKBTitleCode)TC0000225736 035 $a(PQKBWorkID)10230991 035 $a(PQKB)10194813 035 $a(MiAaPQ)EBC231645 035 $a(EXLCZ)991000000000023481 100 $a20130418d2004|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 12$aA Practical Guide to Managing Information Security$b[electronic resource] 210 $aNorwood $cArtech House$d2004 215 $a1 online resource (280 p.) 300 $aDescription based upon print version of record. 311 $a1-58053-702-2 327 $aA Practical Guide to Managing Information Security; Contents vii; Preface xiii; Acknowledgments xvii; CHAPTER 1 The need for a proactive approach 1; CHAPTER 2 Management techniques 23; CHAPTER 3 Technical tools 47; CHAPTER 4 A proactive approach: Overview 85; CHAPTER 5 The information-security strategy 109; CHAPTER 6 Policy and standards 131; CHAPTER 7 Process design and implementation 155; CHAPTER 8 Building an IT security architecture 181; CHAPTER 9 Creating a security-minded culture 215; Appendix: Fast risk analysis 241; About the author 249; Index 251 330 $aThis groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need to align the information security process as a whole with the requirements of the modern enterprise, which involves empowering business managers to manage information security-related risk. Throughout, the book places emphasis on the use of simple, p 606 $aComputer security 606 $aComputer Science$2HILCC 606 $aEngineering & Applied Sciences$2HILCC 615 4$aComputer security. 615 7$aComputer Science 615 7$aEngineering & Applied Sciences 676 $a658.4/78 676 $a658.472 700 $aPurser$b Steve$01507627 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910783281503321 996 $aA Practical Guide to Managing Information Security$93738523 997 $aUNINA