000 | 02859cam a2200529Ii 4500 | ||
---|---|---|---|
001 | ocn960280790 | ||
003 | OCoLC | ||
005 | 20190328114816.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 161011s2017 mau ob 001 0 eng d | ||
040 |
_aYDX _beng _epn _cYDX _dN$T _dIDEBK _dTEFOD _dN$T _dOPELS _dN$T _dOCLCF _dGGVRL _dOCLCQ _dOCLCO _dUPM _dOCLCQ _dOTZ _dCNCGM _dVGM _dOCLCQ _dU3W _dOCLCA _dD6H _dOCLCQ _dWYU |
||
019 |
_a960492646 _a964536772 |
||
020 |
_a9780128020883 _q(electronic bk.) |
||
020 |
_a0128020881 _q(electronic bk.) |
||
020 | _z9780128020425 | ||
020 | _z0128020423 | ||
035 |
_a(OCoLC)960280790 _z(OCoLC)960492646 _z(OCoLC)964536772 |
||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aAndress, Jason, _eauthor. |
|
245 | 1 | 0 |
_aBuilding a practical information security program / _h[electronic resource] _cJason Andress, CISSP, ISSAP, CISM, GPEN, Mark Leary, CISSP, CISM, CGIET, PMP. |
260 |
_aCambridge, MA : _bSyngress, _c�2017. |
||
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aChapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics. | |
520 | _aDemonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aInformation storage and retrieval systems _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aInformation storage and retrieval systems _xSecurity measures. _2fast _0(OCoLC)fst00973027 |
|
655 | 4 | _aElectronic books. | |
700 | 1 |
_aLeary, Mark, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _z9780128020425 _z0128020423 _w(OCoLC)895731255 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128020425 |
999 |
_c247444 _d247444 |