Local cover image
Local cover image

Information security management : concepts and practice / Bel G. Raggad

By: Material type: TextTextPublisher: Boca Raton : CRC Press, [2010]Description: xxxiv, 832 pages : illustrationsContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781420078541
Subject(s): DDC classification:
  • 005.8
Contents:
Section I. Introduction
Introduction to information security management
Introduction to management concepts
The information security life cycle
Section II. Security plan
Security plan
Security policy
Business continuity planning
Section III. Security analysis
Security risk management
Continual security : integrated fault-event analysis and response framework (IFEAR)
Active security assessment
System availability
Section IV. Security design
Nominal security enhancement design based on ISO/IEC 27002
Technical security enhancement based on ISO/IEC 27001
Section V. Security implementation
The common criteria
Section IV. Security review
Privacy rights, information technology, and HIPAA
Section VII. Continual security
Cyberterrorism and homeland security
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Book Book Matandang Balara Branch Reference Section Circulation C 005.8 R142i 2010 (Browse shelf(Opens below)) Available 120720d

Includes bibliographical references and index.

Section I. Introduction

Introduction to information security management

Introduction to management concepts

The information security life cycle

Section II. Security plan

Security plan

Security policy

Business continuity planning

Section III. Security analysis

Security risk management

Continual security : integrated fault-event analysis and response framework (IFEAR)

Active security assessment

System availability

Section IV. Security design

Nominal security enhancement design based on ISO/IEC 27002

Technical security enhancement based on ISO/IEC 27001

Section V. Security implementation

The common criteria

Section IV. Security review

Privacy rights, information technology, and HIPAA

Section VII. Continual security

Cyberterrorism and homeland security

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image