• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Practical information security management :

پدید آورنده
Tony Campbell

موضوع
Computer security-- Management.

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1484216857
(Number (ISBN
9781484216859
Erroneous ISBN
1484216849
Erroneous ISBN
9781484216842

NATIONAL BIBLIOGRAPHY NUMBER

Number
dltt

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Practical information security management :
General Material Designation
[Book]
Other Title Information
a complete guide to planning and implementation /
First Statement of Responsibility
Tony Campbell

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

CONTENTS NOTE

Text of Note
At a Glance; Contents; About the Author; About the Technical Reviewers; Acknowledgments; Introduction; Chapter 1: Evolution of a Profession; What's in a Name?; The Language of Security; CIA; Confidentiality; Integrity; Availability; Non-Repudiation; Threats and Vulnerabilities; Risk and Consequence; Glossary of Useful Terms; Chapter 2: Threats and Vulnerabilities; Threats; Hiding in Plain Sight; How Does Tor Work?; The Deep Web; Malware as a Service; Criminal Motivations and Capabilities; Physical Threats; Vulnerabilities; Technical Vulnerabilities; Non-Technical Vulnerabilities
Text of Note
Encourage a Culture of Security AwarenessWorking with Specialist Groups; Working with Standards and Regulations; Working with Risk Management; Risk Identification; Risk Analysis; Qualitative Assessments; Quantitative Analysis; Risk Treatment; Risk Monitoring; Business Continuity Management and Disaster Planning; Working with Enterprise Architecture; Working with Facilities Management; Conclusion; Chapter 5: Information Security Implementation; Integration with Risk Management; The Language of Risk; Use Existing Frameworks; Secure Development; Security Architecture Awareness
Text of Note
Physical VulnerabilitiesProcess Vulnerabilities; People Vulnerabilities; People Can Be Compromised; Chapter 3: The Information Security Manager; Information Security Job Roles; Training, Experience, and Professionalism; Career Planning with Professional and Academic Certifications; Getting Started in Security Management; The Information Security Manager's Responsibilities; The Information Security Management System; Chapter 4: Organizational Security; Security in Organizational Structures; Where Does Security Fit?; License to Operate: Get Your Guys Certified
Text of Note
Risk Management StandardsCOBIT; Payment Card Industry Data Security Standard; Health Insurance Portability and Accountability Act; Conclusion; Chapter 7: Protection of Information; Information Classification; Business Impact Levels; Implementing Information Classification; Information Classification or Systems Classification?; Tactical Implementation; Strategic Implementation; Identification, Authentication, and Authorization; Access Control Models; System Privileges; Separation of Duties; Delegation of Privileges; Chapter 8: Protection of People; Human Vulnerabilities; Social Engineering
Text of Note
Security RequirementsOrganizational Interfaces; Post Implementation; Conclusion; Chapter 6: Standards, Frameworks, Guidelines, and Legislation; Why Do We Need Standards?; Legislation; Privacy; US-EU Safe Harbor and Privacy Shield; Employer and Employee Rights; Computer Fraud and Abuse Laws; US Computer Fraud and Abuse Act; UK Computer Misuse Act; Australia's Cybercrime Act; Records Retention; Intellectual Property and Copyright; The ISO/IEC 27000 Series of Standards; ISO/IEC 27001; Getting Certified; ISO/IEC 27002; ISO/IEC 27035; List of Published ISO/IEC 27000 Standards; Business Continuity
0
8
8
8
8

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
MIL
Stock Number
974908

TOPICAL NAME USED AS SUBJECT

Computer security-- Management.

DEWEY DECIMAL CLASSIFICATION

Number
004
Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - PRIMARY RESPONSIBILITY

Campbell, Tony.

CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY

Ohio Library and Information Network.

ORIGINATING SOURCE

Date of Transaction
20170120013902.1
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival