000 03518cam a2200421 i 4500
999 _c4910
_d4910
001 18288822
005 20180429131551.0
008 140903t20152015nyua b 001 0 eng
010 _a 2014031481
020 _a9780071821650 (paperback)
020 _a0071821651 (paperback)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aTK5105.59
_b.S365 2015
082 0 0 _a005.74
_223
084 _aCOM053000
_2bisacsh
100 1 _aSchou, Corey.
245 1 0 _aInformation assurance handbook :
_beffective computer security and risk management strategies /
_cCorey Schou, Steven Hernandez.
250 _a1st ed.
260 _aNew York :
_bMcGraw-Hill Education,
_c2015.
264 1 _aNew York :
_bMcGraw-Hill Education,
_c[2015]
300 _axxix, 450 pages :
_billustrations ;
_c24 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 8 _aMachine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.
520 _a"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--
650 0 _aComputer networks
_xSecurity measures
_vHandbooks, manuals, etc.
650 0 _aComputer security
_vHandbooks, manuals, etc.
650 0 _aData protection
_vHandbooks, manuals, etc.
650 0 _aInformation storage and retrieval systems
_xSecurity measures
_vHandbooks, manuals, etc.
650 7 _aCOMPUTERS / Security / General.
_2bisacsh
700 1 _aHernandez, Steven.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK