000 -LEADER |
fixed length control field |
02567cam a2200313 a 4500 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151030s2016 flu b 001 0 eng |
LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2015040188 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781482245899 |
CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
AUTHENTICATION CODE |
Authentication code |
pcc |
LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HF5548.37 |
Item number |
.L3577 2016 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.4/78 |
Edition number |
23 |
SYSTEM CONTROL NUMBER |
System control number |
(IMchF)fol15934395 |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20170126101244.0 |
CONTROL NUMBER |
control field |
65175 |
CONTROL NUMBER IDENTIFIER |
control field |
UOWD |
MAIN ENTRY--PERSONAL NAME |
Personal name |
Landoll, Douglas J. |
TITLE STATEMENT |
Title |
Information security policies, procedures, and standards : |
Remainder of title |
a practitioner's reference |
Statement of responsibility, etc |
Douglas J. Landoll |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton : |
Name of publisher, distributor, etc |
CRC Press, Taylor & Francis Group, |
Date of publication, distribution, etc |
c2016. |
PHYSICAL DESCRIPTION |
Extent |
xiv, 240 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
SUMMARY, ETC. |
Summary, etc |
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. |
FORMATTED CONTENTS NOTE |
Formatted contents note |
IntroductionNo Short CutsTop-Down SecurityCurrent State of Information Security Policy SetsEffectiveness of Information Security Policy SetsExercisesInformation Security Policy BasicsInformation Security Policy TypesExercisesInformation Security Policy FrameworkInformation Security Policy Sets without FrameworksInformation Security Policy Sets with FrameworksCommon Information SPFsTailoring Information SPFsDeriving a Policy Set from a FrameworkExercisesInformation Security Policy DetailsFront MatterPolicy StatementsSpecific Information Security PoliciesPolicy Document ExamplesExercisesInformation Security Procedures and StandardsLess Formal Language and StructureVarious Purposes of the Standard and GuidelineInformation Security ProceduresExercisesInformation Security Policy ProjectsScoping the ProjectInformation Security Policy Project RolesInformation Security Policy Project PhasesInformation Security Policy Revision ProjectInformation Security Policy Project ApplicationExercisesAppendicesExample Policies (FISMA Framework)Example Departmental PolicyTailoring Guide. |
STUDY PROGRAM INFORMATION NOTE |
Program name |
ISIT937 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Business |
General subdivision |
Data processing |
-- |
Security measures |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
REGULAR |