Information Security A Practical Guide : (Record no. 56771)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 04039cam a2200385Mi 4500 |
| 001 - CONTROL NUMBER | |
| control field | 342043 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20211207110841.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
| fixed length control field | m o d |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
| fixed length control field | m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr |n||||||||| |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr |n||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 180928s2015 xx o 000 0 ENG d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781849287418 |
| Qualifying information | (electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781849287425 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 1849287422 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 1849287406 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781849287401 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781849287425 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 1849287422 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 1849287406 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781849287401 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | 342043 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)914151232 |
| 100 10 - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Mooney, Tom |
| 245 10 - TITLE STATEMENT | |
| Title | Information Security A Practical Guide : |
| Remainder of title | Bridging the gap between IT and management. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Ely, Cambridgeshire, England : |
| Name of publisher, distributor, etc. | IT Governance Publishing, |
| Date of publication, distribution, etc. | 2015 ; |
| Place of publication, distribution, etc. | Ely, Cambridgeshire, England : |
| Name of publisher, distributor, etc. | IT Governance Publishing. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 online resource (134 pages) $a<length> |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Cover; Title; Copyright; Contents; Chapter 1: Day One as a Security Professional; Chapter Overview; Objectives; Your First Day; Confidentiality, Integrity and Availability (CIA); Getting to Know the Business; Key IT Personnel; What is the Security Culture?; Identifying the Gaps in Security; Chapter 2: Business Impact of Breaches; Chapter Overview; Objectives; How to Assess the Impact; Data Types; Impacts; Reputational Damage; Personal Impact; Contractual Impact; Financial Impact; Legal Impacts; Chapter 3: Business Risk Appetite; Chapter Overview; Objectives; Risk Appetite; Risk Treatments. |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter 4: ThreatsChapter Overview; Objectives; Types of Threats; Hackers; Malware Writers; Script Kiddies; Journalists; Criminals; Physical Intruder; Researchers; Hacktivists; Disgruntled Employees; Chapter 5: Quick and Dirty Risk Assessment; Chapter Overview; Objectives; Identifying Risks; Defining the Risk Level; Risk Table; Realigning the Risk Level; Chapter 6: Getting Buy-in From Your Peers; Chapter Overview; Objectives; Points of Contact with your Peers; How to Engage with your Peers; Chapter 7: Documenting the System For Everyone; Chapter Overview; Objectives; Setting the Scene. |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | EntitiesService Overview; Adding Boundaries; Showing Information Flow; Adding the Threats; Chapter 8: Mapping Data in the System; Chapter Overview; Objectives; Mapping Data; Chapter 9: Penetration Testing; Chapter Overview; Objectives; Types of Penetration Test; Scoping the test; Trusting the Testers; Implementing Fixes; Chapter 10: Information Security Policy; Chapter Overview; Objectives; The Advantages of Security Policies; Giving Your Policies Teeth; Key Security Policies; Ways of Ensuring Your Policy is Read; ITG Resources. |
| 520 3# - SUMMARY, ETC. | |
| Summary, etc. | Cover; Title; Copyright; Contents; Chapter 1: Day One as a Security Professional; Chapter Overview; Objectives; Your First Day; Confidentiality, Integrity and Availability (CIA); Getting to Know the Business; Key IT Personnel; What is the Security Culture?; Identifying the Gaps in Security; Chapter 2: Business Impact of Breaches; Chapter Overview; Objectives; How to Assess the Impact; Data Types; Impacts; Reputational Damage; Personal Impact; Contractual Impact; Financial Impact; Legal Impacts; Chapter 3: Business Risk Appetite; Chapter Overview; Objectives; Risk Appetite; Risk TreatmentsChapter 4: ThreatsChapter Overview; Objectives; Types of Threats; Hackers; Malware Writers; Script Kiddies; Journalists; Criminals; Physical Intruder; Researchers; Hacktivists; Disgruntled Employees; Chapter 5: Quick and Dirty Risk Assessment; Chapter Overview; Objectives; Identifying Risks; Defining the Risk Level; Risk Table; Realigning the Risk Level; Chapter 6: Getting Buy-in From Your Peers; Chapt ... |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole. |
| 856 4# - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1030092">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1030092</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | EBOOK |
| Suppress in OPAC | No |
No items available.
