top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Autore Simmons Andrea
Edizione [2nd ed.]
Pubbl/distr/stampa Ely, : IT Governance Ltd, 2015
Descrizione fisica 1 online resource (273 p.)
Disciplina 005.8
Soggetto topico Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures
Computer networks -- Security measures
Computer security -- Management
Data protection
Information technology -- Security measures
Commerce
Business & Economics
Marketing & Sales
Soggetto genere / forma Electronic books.
ISBN 1-84928-710-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings
Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy
Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary
Record Nr. UNINA-9910460203303321
Simmons Andrea  
Ely, : IT Governance Ltd, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Autore Simmons Andrea
Edizione [2nd ed.]
Pubbl/distr/stampa Ely, : IT Governance Ltd, 2015
Descrizione fisica 1 online resource (273 p.)
Disciplina 005.8
Soggetto topico Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures
Computer networks -- Security measures
Computer security -- Management
Data protection
Information technology -- Security measures
Commerce
Business & Economics
Marketing & Sales
ISBN 1-84928-710-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings
Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy
Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary
Record Nr. UNINA-9910787343203321
Simmons Andrea  
Ely, : IT Governance Ltd, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Autore Simmons Andrea
Edizione [2nd ed.]
Pubbl/distr/stampa Ely, : IT Governance Ltd, 2015
Descrizione fisica 1 online resource (273 p.)
Disciplina 005.8
Soggetto topico Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures
Computer networks -- Security measures
Computer security -- Management
Data protection
Information technology -- Security measures
Commerce
Business & Economics
Marketing & Sales
ISBN 1-84928-710-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings
Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy
Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary
Record Nr. UNINA-9910818626303321
Simmons Andrea  
Ely, : IT Governance Ltd, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui