000 01883nam a22005177a 4500
999 _c14759
_d14758
003 OSt
005 20231110085512.0
008 220214s2010 flua|||| b||| 001 0 eng d
020 _a9781420078541
040 _cQCPL
082 _a005.8
100 1 _aRaggad, Bel G.
_eauthor
245 1 0 _aInformation security management
_b: concepts and practice
_c/ Bel G. Raggad
264 1 _aBoca Raton :
_bCRC Press,
_c[2010]
300 _axxxiv, 832 pages :
_billustrations
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
504 _aIncludes bibliographical references and index.
505 0 _aSection I. Introduction
505 0 _aIntroduction to information security management
505 0 _aIntroduction to management concepts
505 0 _aThe information security life cycle
505 0 _aSection II. Security plan
505 0 _aSecurity plan
505 0 _aSecurity policy
505 0 _aBusiness continuity planning
505 0 _aSection III. Security analysis
505 0 _aSecurity risk management
505 0 _aContinual security : integrated fault-event analysis and response framework (IFEAR)
505 0 _aActive security assessment
505 0 _aSystem availability
505 0 _aSection IV. Security design
505 0 _aNominal security enhancement design based on ISO/IEC 27002
505 0 _aTechnical security enhancement based on ISO/IEC 27001
505 0 _aSection V. Security implementation
505 0 _aThe common criteria
505 0 _aSection IV. Security review
505 0 _aPrivacy rights, information technology, and HIPAA
505 0 _aSection VII. Continual security
505 0 _aCyberterrorism and homeland security
650 _aComputer security
_xManagement
650 _aData protection
942 _2ddc
_cBOOK
690 _aComputers & technology