The Manchester College

Information Security A Practical Guide : (Record no. 56771)

MARC details
000 -LEADER
fixed length control field 04039cam a2200385Mi 4500
001 - CONTROL NUMBER
control field 342043
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20211207110841.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180928s2015 xx o 000 0 ENG d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781849287418
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781849287425
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1849287422
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1849287406
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781849287401
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781849287425
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1849287422
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1849287406
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781849287401
035 ## - SYSTEM CONTROL NUMBER
System control number 342043
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)914151232
100 10 - MAIN ENTRY--PERSONAL NAME
Personal name Mooney, Tom
245 10 - TITLE STATEMENT
Title Information Security A Practical Guide :
Remainder of title Bridging the gap between IT and management.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Ely, Cambridgeshire, England :
Name of publisher, distributor, etc. IT Governance Publishing,
Date of publication, distribution, etc. 2015 ;
Place of publication, distribution, etc. Ely, Cambridgeshire, England :
Name of publisher, distributor, etc. IT Governance Publishing.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (134 pages) $a<length>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Title; Copyright; Contents; Chapter 1: Day One as a Security Professional; Chapter Overview; Objectives; Your First Day; Confidentiality, Integrity and Availability (CIA); Getting to Know the Business; Key IT Personnel; What is the Security Culture?; Identifying the Gaps in Security; Chapter 2: Business Impact of Breaches; Chapter Overview; Objectives; How to Assess the Impact; Data Types; Impacts; Reputational Damage; Personal Impact; Contractual Impact; Financial Impact; Legal Impacts; Chapter 3: Business Risk Appetite; Chapter Overview; Objectives; Risk Appetite; Risk Treatments.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 4: ThreatsChapter Overview; Objectives; Types of Threats; Hackers; Malware Writers; Script Kiddies; Journalists; Criminals; Physical Intruder; Researchers; Hacktivists; Disgruntled Employees; Chapter 5: Quick and Dirty Risk Assessment; Chapter Overview; Objectives; Identifying Risks; Defining the Risk Level; Risk Table; Realigning the Risk Level; Chapter 6: Getting Buy-in From Your Peers; Chapter Overview; Objectives; Points of Contact with your Peers; How to Engage with your Peers; Chapter 7: Documenting the System For Everyone; Chapter Overview; Objectives; Setting the Scene.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note EntitiesService Overview; Adding Boundaries; Showing Information Flow; Adding the Threats; Chapter 8: Mapping Data in the System; Chapter Overview; Objectives; Mapping Data; Chapter 9: Penetration Testing; Chapter Overview; Objectives; Types of Penetration Test; Scoping the test; Trusting the Testers; Implementing Fixes; Chapter 10: Information Security Policy; Chapter Overview; Objectives; The Advantages of Security Policies; Giving Your Policies Teeth; Key Security Policies; Ways of Ensuring Your Policy is Read; ITG Resources.
520 3# - SUMMARY, ETC.
Summary, etc. Cover; Title; Copyright; Contents; Chapter 1: Day One as a Security Professional; Chapter Overview; Objectives; Your First Day; Confidentiality, Integrity and Availability (CIA); Getting to Know the Business; Key IT Personnel; What is the Security Culture?; Identifying the Gaps in Security; Chapter 2: Business Impact of Breaches; Chapter Overview; Objectives; How to Assess the Impact; Data Types; Impacts; Reputational Damage; Personal Impact; Contractual Impact; Financial Impact; Legal Impacts; Chapter 3: Business Risk Appetite; Chapter Overview; Objectives; Risk Appetite; Risk TreatmentsChapter 4: ThreatsChapter Overview; Objectives; Types of Threats; Hackers; Malware Writers; Script Kiddies; Journalists; Criminals; Physical Intruder; Researchers; Hacktivists; Disgruntled Employees; Chapter 5: Quick and Dirty Risk Assessment; Chapter Overview; Objectives; Identifying Risks; Defining the Risk Level; Risk Table; Realigning the Risk Level; Chapter 6: Getting Buy-in From Your Peers; Chapt ...
520 ## - SUMMARY, ETC.
Summary, etc. Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
856 4# - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1030092">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1030092</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type EBOOK
Suppress in OPAC No

No items available.