000 | 01883nam a22005177a 4500 | ||
---|---|---|---|
999 |
_c14759 _d14758 |
||
003 | OSt | ||
005 | 20231110085512.0 | ||
008 | 220214s2010 flua|||| b||| 001 0 eng d | ||
020 | _a9781420078541 | ||
040 | _cQCPL | ||
082 | _a005.8 | ||
100 | 1 |
_aRaggad, Bel G. _eauthor |
|
245 | 1 | 0 |
_aInformation security management _b: concepts and practice _c/ Bel G. Raggad |
264 | 1 |
_aBoca Raton : _bCRC Press, _c[2010] |
|
300 |
_axxxiv, 832 pages : _billustrations |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _aunmediated |
||
338 |
_2rdacarrier _avolume |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aSection I. Introduction | |
505 | 0 | _aIntroduction to information security management | |
505 | 0 | _aIntroduction to management concepts | |
505 | 0 | _aThe information security life cycle | |
505 | 0 | _aSection II. Security plan | |
505 | 0 | _aSecurity plan | |
505 | 0 | _aSecurity policy | |
505 | 0 | _aBusiness continuity planning | |
505 | 0 | _aSection III. Security analysis | |
505 | 0 | _aSecurity risk management | |
505 | 0 | _aContinual security : integrated fault-event analysis and response framework (IFEAR) | |
505 | 0 | _aActive security assessment | |
505 | 0 | _aSystem availability | |
505 | 0 | _aSection IV. Security design | |
505 | 0 | _aNominal security enhancement design based on ISO/IEC 27002 | |
505 | 0 | _aTechnical security enhancement based on ISO/IEC 27001 | |
505 | 0 | _aSection V. Security implementation | |
505 | 0 | _aThe common criteria | |
505 | 0 | _aSection IV. Security review | |
505 | 0 | _aPrivacy rights, information technology, and HIPAA | |
505 | 0 | _aSection VII. Continual security | |
505 | 0 | _aCyberterrorism and homeland security | |
650 |
_aComputer security _xManagement |
||
650 | _aData protection | ||
942 |
_2ddc _cBOOK |
||
690 | _aComputers & technology |