Information Security Management Principles [[electronic resource] ] : An ISEB Certificate |
Autore | Taylor Andy |
Pubbl/distr/stampa | Swindon, : British Computer Society, 2008 |
Descrizione fisica | 1 online resource (216 p.) |
Disciplina |
005.8
005.8068 |
Altri autori (Persone) |
AlexanderDavid
FinchAmanda SuttonDavid TaylorAndy |
Soggetto topico |
Computer networks -- Security measures
Computer security -- Management Computer viruses Engineering & Applied Sciences Computer Science |
ISBN | 1-906124-39-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover |
Record Nr. | UNISA-996339087303316 |
Taylor Andy | ||
Swindon, : British Computer Society, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Management Principles : An ISEB Certificate |
Autore | Taylor Andy |
Pubbl/distr/stampa | Swindon, : British Computer Society, 2008 |
Descrizione fisica | 1 online resource (216 p.) |
Disciplina |
005.8
005.8068 |
Altri autori (Persone) |
AlexanderDavid
FinchAmanda SuttonDavid TaylorAndy |
Soggetto topico |
Computer networks -- Security measures
Computer security -- Management Computer viruses Engineering & Applied Sciences Computer Science |
ISBN | 1-906124-39-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover |
Record Nr. | UNINA-9910139870803321 |
Taylor Andy | ||
Swindon, : British Computer Society, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world |
Autore | Simmons Andrea |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Ely, : IT Governance Ltd, 2015 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 005.8 |
Soggetto topico |
Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures Computer networks -- Security measures Computer security -- Management Data protection Information technology -- Security measures Commerce Business & Economics Marketing & Sales |
Soggetto genere / forma | Electronic books. |
ISBN | 1-84928-710-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary |
Record Nr. | UNINA-9910460203303321 |
Simmons Andrea | ||
Ely, : IT Governance Ltd, 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world |
Autore | Simmons Andrea |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Ely, : IT Governance Ltd, 2015 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 005.8 |
Soggetto topico |
Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures Computer networks -- Security measures Computer security -- Management Data protection Information technology -- Security measures Commerce Business & Economics Marketing & Sales |
ISBN | 1-84928-710-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary |
Record Nr. | UNINA-9910787343203321 |
Simmons Andrea | ||
Ely, : IT Governance Ltd, 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world |
Autore | Simmons Andrea |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Ely, : IT Governance Ltd, 2015 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 005.8 |
Soggetto topico |
Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures Computer networks -- Security measures Computer security -- Management Data protection Information technology -- Security measures Commerce Business & Economics Marketing & Sales |
ISBN | 1-84928-710-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary |
Record Nr. | UNINA-9910818626303321 |
Simmons Andrea | ||
Ely, : IT Governance Ltd, 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|