000 02859cam a2200529Ii 4500
001 ocn960280790
003 OCoLC
005 20190328114816.0
006 m o d
007 cr |n|||||||||
008 161011s2017 mau ob 001 0 eng d
040 _aYDX
_beng
_epn
_cYDX
_dN$T
_dIDEBK
_dTEFOD
_dN$T
_dOPELS
_dN$T
_dOCLCF
_dGGVRL
_dOCLCQ
_dOCLCO
_dUPM
_dOCLCQ
_dOTZ
_dCNCGM
_dVGM
_dOCLCQ
_dU3W
_dOCLCA
_dD6H
_dOCLCQ
_dWYU
019 _a960492646
_a964536772
020 _a9780128020883
_q(electronic bk.)
020 _a0128020881
_q(electronic bk.)
020 _z9780128020425
020 _z0128020423
035 _a(OCoLC)960280790
_z(OCoLC)960492646
_z(OCoLC)964536772
050 4 _aTK5105.59
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aAndress, Jason,
_eauthor.
245 1 0 _aBuilding a practical information security program /
_h[electronic resource]
_cJason Andress, CISSP, ISSAP, CISM, GPEN, Mark Leary, CISSP, CISM, CGIET, PMP.
260 _aCambridge, MA :
_bSyngress,
_c�2017.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aChapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.
520 _aDemonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInformation storage and retrieval systems
_xSecurity measures.
650 0 _aComputer security.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aInformation storage and retrieval systems
_xSecurity measures.
_2fast
_0(OCoLC)fst00973027
655 4 _aElectronic books.
700 1 _aLeary, Mark,
_eauthor.
776 0 8 _iPrint version:
_z9780128020425
_z0128020423
_w(OCoLC)895731255
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128020425
999 _c247444
_d247444