Information assurance handbook : effective computer security and risk management strategies /

"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to inte...

Full description

Saved in:
Bibliographic Details
Main Author: Schou, Corey
Other Authors: Hernandez, Steven
Format: Book
Language:English
Published: New York : McGraw-Hill Education, [2015]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam a2200000 i 4500
001 18288822
003 KE-NaDUL
005 20180309112027.0
008 140903t20152015nyua b 001 0 eng
952 |0 0  |1 0  |2 lcc  |4 0  |6 TK010559 S36 02015  |7 0  |8 GC  |9 124601  |a DUA  |b DUA  |c GC  |d 2018-03-09  |e Educate Yourself  |g 9490.00  |l 0  |o TK105.59.S36 2015  |p BK0105441  |r 2018-03-09 00:00:00  |w 2018-03-09  |x 105,441  |y G 
952 |0 0  |1 0  |2 lcc  |4 0  |6 TK010559 S36 02015  |7 0  |8 GC  |9 124602  |a DUA  |b DUA  |c GC  |d 2018-03-09  |e Educate Yourself  |g 9490.00  |l 0  |o TK105.59.S36 2015  |p BK0105442  |r 2018-03-09 00:00:00  |w 2018-03-09  |x 105,442  |y G 
952 |0 0  |1 0  |2 lcc  |4 0  |6 TK010559 S36 02015  |7 0  |8 GC  |9 124603  |a DUA  |b DUA  |c GC  |d 2018-03-09  |e Educate Yourself  |g 9490.00  |l 0  |o TK105.59.S36 2015  |p BK0105443  |r 2018-03-09 00:00:00  |w 2018-03-09  |x 105,443  |y G 
952 |0 0  |1 0  |2 lcc  |4 0  |6 TK010559 S36 02015  |7 0  |8 GC  |9 124604  |a DUN  |b DUN  |c GC  |d 2018-03-09  |e Educate Yourself  |g 9490.00  |l 0  |o TK105.59.S36 2015  |p BK0105444  |r 2018-03-09 00:00:00  |w 2018-03-09  |x 105,444  |y G 
952 |0 0  |1 0  |2 lcc  |4 0  |6 TK010559 S36 02015  |7 0  |8 GC  |9 124605  |a DUN  |b DUN  |c GC  |d 2018-03-09  |e Educate Yourself  |g 9490.00  |l 0  |o TK105.59.S36 2015  |p BK0105445  |r 2018-03-09 00:00:00  |w 2018-03-09  |x 105,445  |y G 
999 |c 189307  |d 189307 
010 |a  2014031481 
020 |a 9780071821650 (paperback) 
020 |a 0071821651 (paperback) 
040 |a DLC  |b eng  |c DUL  |e rda  |d DUL 
042 |a pcc 
082 0 0 |a 658.4/78  |2 23 
084 |a COM053000  |2 bisacsh 
100 1 |a Schou, Corey.  |9 1029 
245 1 0 |a Information assurance handbook :  |b effective computer security and risk management strategies /  |c Corey Schou, Steven Hernandez. 
260 |a New York :  |b McGraw-Hill Education,  |c [2015] 
300 |a xxix, 450 pages :  |b illustrations ;  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 8 |a Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices. 
520 |a "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--  |c Provided by publisher. 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc.  |9 1030 
650 0 |a Computer security  |v Handbooks, manuals, etc.  |9 1031 
650 0 |a Data protection  |v Handbooks, manuals, etc.  |9 1032 
650 0 |a Information storage and retrieval systems  |x Security measures  |v Handbooks, manuals, etc.  |9 1033 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh  |9 1034 
700 1 |a Hernandez, Steven.  |9 1035 
906 |a 7  |b cbc  |c orignew  |d 1  |e ecip  |f 20  |g y-gencatlg 
942 |2 lcc  |c G  |h TK5105.59  |i .S36  |m  2015  |6 TK510559 S36 
955 |b rk09 2014-09-03  |i rk09 2014-09-03 ONIX  |a xn08 2015-05-18 1 copy rec'd., to CIP ver.  |a rk16 2015 05 28 Bk rec'd