Vai al contenuto principale della pagina
| Autore: |
Simmons Andrea
|
| Titolo: |
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
|
| Pubblicazione: | Ely, : IT Governance Ltd, 2015 |
| Edizione: | 2nd ed. |
| Descrizione fisica: | 1 online resource (273 p.) |
| Disciplina: | 005.8 |
| Soggetto topico: | Business enterprises -- Computer networks -- Security measures |
| Business enterprises -- Information technology -- Security measures | |
| Computer networks -- Security measures | |
| Computer security -- Management | |
| Data protection | |
| Information technology -- Security measures | |
| Commerce | |
| Business & Economics | |
| Marketing & Sales | |
| Soggetto genere / forma: | Electronic books. |
| Note generali: | Description based upon print version of record. |
| Nota di contenuto: | Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction |
| Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings | |
| Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy | |
| Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary | |
| Titolo autorizzato: | Once more unto the Breach ![]() |
| ISBN: | 1-84928-710-4 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910460203303321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |