Information Security Planning : A Practical Approach / / by Susan Lincke |
Autore | Lincke Susan |
Edizione | [2nd ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (446 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Data protection - Law and legislation Business information services Computers - Law and legislation Information technology - Law and legislation Principles and Models of Security Data and Information Security Privacy Business Information Systems Legal Aspects of Computing |
ISBN | 3-031-43118-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part. I. The Problem of Security -- Chapter. 1. Security Awareness: Brave New World -- Chapter. 2. Combatting Fraud -- Chapter. 3. Complying with the PCI DSS Standard -- Part. II. Strategic Security Planning -- Chapter. 4. Managing Risk -- Chapter. 5. Addressing Business Impact Analysis and Business Continuity -- Chapter. 6. Governing: Policy, Maturity Models and Planning -- Part. III. Tactical Security Planning -- Chapter. 7. Designing Information Security -- Chapter. 8. Planning for Network Security -- Chapter. 9. Designing Physical Security -- Chapter. 10. Attending to Information Privacy -- Chapter. 11. Planning for Alternative Networks: Cloud Security and Zero Trust -- Chapter. 12. Organizing Personnel Security -- Part. IV. Planning for Detect, Respond, Recover -- Chapter. 13. Planning for Incident Response -- Chapter. 14. Defining Security Metrics -- Chapter. 15. Performing an Audit or Security Test.-Chapter. 16. Preparing for Forensic Analysis -- Part. V. Complying with National Regulations and Ethics -- Chapter. 17. Complying with the European Union General Data Protection Regulation (GDPR) -- Chapter. 18. Complying with U.S. Security Regulations -- Chapter. 19. Complying with HIPAA and HITECH -- Chapter. 20. Maturing Ethical Risk -- Part. VI. Developing Secure Software -- Chapter. 21. Understanding Software Threats and Vulnerabilities -- Chapter. 22. Defining a Secure Software Process -- Chapter. 23. Planning for Secure Software Requirements and Design with UML. |
Record Nr. | UNINA-9910800115103321 |
Lincke Susan | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security Planning : An Applied Approach / / by Susan Lincke |
Autore | Lincke Susan |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (294 p.) |
Disciplina |
004
005.7 005.8 650 |
Soggetto topico |
Computer security
Business Management science Application software Systems and Data Security Business and Management, general Information Systems Applications (incl. Internet) |
ISBN | 3-319-16027-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Security Awareness -- Combatting Fraud -- Complying with Security Regulation and Standards -- Managing Risk -- Addressing Business Impact Analysis and Business Continuity -- Governing -- Important Tactical Concepts -- Planning for Network Security -- Designing Physical Security -- Organizing Personal Security -- Planning for Incident Response -- Defining Security Metrics -- Performing an Audit or Security Test -- Complying with HIPAA and HITECH -- Developing Secure Software. |
Record Nr. | UNINA-9910299250303321 |
Lincke Susan | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|