Roadmap to information security : (Record no. 27015)

LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011925445
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781435480308
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 005.8
MAIN ENTRY--PERSONAL NAME
Authors Whitman, Michael E.
TITLE STATEMENT
Title Roadmap to information security :
Subtitle for IT and InfoSec managers /
Statement of responsibility, etc Michael E. Whitman; Herbert J. Mattord
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boston, MA :
Publisher Course Technology/Cengage Learning,
Date c2011.
PHYSICAL DESCRIPTION
Extent xxix, 523 p. :
Other Details ill., maps ;
Size 24 cm.
GENERAL NOTE
General note Note: Foreword by Donn B. Parker
CONTENTS
Contents Part I: OVERVIEW OF THE SECURITY LANDSCAPE. 1. Introduction to the Roadmap to Information Security Roadmap. 2. Threats to Information Assets. 3. Attacks on Information Assets. Part II: STRATEGIC INFORMATION SECURITY: SECURITY GOVERNANCE. 4. Information Technology and Information Security Governance. 5. Information Security Roles and Responsibilities. 6. Positioning the Information Security Function. 7. Conducting an Information Security Assessment. Part III: STRATEGIC INFORMATION SECURITY: RISK MANAGEMENT. 8. Risk Management: Risk Identification. 9. Risk Management: Risk Assessment. 10. Risk Management: Risk Control. 11. Alternate Approaches to Risk Management. PART IV: STRATEGIC INFORMATION SECURITY: STANDARDS, REGULATIONS, LAW AND ETHICS. 12. Standards for Managing the Information Security Program. 13. Emerging Trends in Certification and Accreditation. 14. Dealing with Regulatory Compliance and Key Legal Issues. 15. Other Important Laws for Every IT/Security Manager. 16. Ethics in IT and Information Security. Part V: TACTICAL INFORMATION SECURITY: POLICIES AND PROGRAMS. 17. Information Security Policy: Development and Implementation. 18. Information Security Policy Types: EISP, ISSP, SysSP. 19. Employment Policies and Practices. 20. Implementing Security Education, Training, and Awareness Programs. Part VI: TACTICAL INFORMATION SECURITY: CONTINGENCY PLANNING. 21. Contingency Planning: Planning for the Worst. 22. The Incident Response Plan. 23. The Disaster Recovery Plan. 24. The Business Continuity Plan. Part VII: OPERATIONAL INFORMATION SECURITY: NETWORK SECURITY. 25. Communications and Operations Management. 26. Firewalls. 27. Protecting Remote Access. 28. Intrusion Detection Systems. 29. Scanning and Analysis Tools. Part VIII: OPERATIONAL INFORMATION SECURITY: CRYPTOGRAPHY AND ACCESS CONTROLS. 30. Cryptography in Theory. 31. Cryptography in Practice. 32. Access Controls and Biometrics. 33. Physical Security. Part IX: SUPPLEMENTAL MATERIALS. Appendix A: Information Security Self-Assessment Checklists. Appendix B: Information Security Certification Guidelines - The CISSP/SSCP. Appendix C: Information Security Certification Guidelines - The CISM.
SUMMARY
Summary Provides an overview of information security and its relationship to the information needs of an organization. This book guides the information technology manager in dealing with the challenges associated with the security aspects of their role, presenting guidance on assessing and improving an organization's security.
STUDY PROGRAM
Program name ISIT937
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer security
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Data protection
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer networks
General Security measures
-- Management
ADDED ENTRY
Name Mattord, Herbert J.
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/5vnk9zyu38eescpj5fjcd66tyw32exw9
Public note Location Map
MAIN ENTRY--PERSONAL NAME
-- 30877
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 641
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 10592
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 30878
ADDED ENTRY
-- 18199
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Date last borrowed Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2015-07-06 AMAUK 1 005.8 WH RO T0017640 2022-12-15 2022-12-15 32.99 2017-01-26 REGULAR
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2015-07-06 AMAUK   005.8 WH RO T0017641 2017-01-26   32.99 2017-01-26 REGULAR

Powered by Koha