skip to content
Information security fundamentals Preview this item
ClosePreview this item
Checking...

Information security fundamentals

Author: Thomas R Peltier
Publisher: Boca Raton [Florida] : CRC Press, [2014] ©2014
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Peltier, Thomas R.
Information security fundamentals
(DLC) 2013023074
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Thomas R Peltier
ISBN: 9781439810637 143981063X 1439810621 9781439810620
OCLC Number: 861532574
Description: 1 online resource (408 pages) : illustrations
Contents: 1. Developing policies / Thomas R. Peltier --
2. Organization of information security / Patrick D. Howard --
3. Cryptology / Maria Dailey --
4. Risk management : the facilitated risk analysis and assessment process / Thomas R. Peltier --
5. Building and maintaining an effective security awareness program / John G. O'Leary --
6. Physical security / John A. Blackley --
7. Disaster recovery and business continuity planning / Kevin McLaughlin --
8. Continuity of operations planning / Jeffrey Sauntry --
9. Access controls / Kimberly Logan --
10. Information system development, acquisition, and maintenance / Quinn R. Shamblin --
11. Information security incident management / Brad Smith --
12. Asset classification / Thomas R. Peltier and William Tompkins --
13. Threats to information security / Justin Peltier --
14. Information security policies : a practitioner's view / Charles Johnson.
Responsibility: Thomas R. Peltier.

Abstract:

"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program. The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"--

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/861532574> # Information security fundamentals
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
   library:oclcnum "861532574" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/725632#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/725632#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:about <http://experiment.worldcat.org/entity/work/data/725632#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:author <http://viaf.org/viaf/65693642> ; # Thomas R. Peltier
   schema:bookFormat schema:EBook ;
   schema:copyrightYear "2014" ;
   schema:datePublished "2014" ;
   schema:description ""Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program. The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"--"@en ;
   schema:description "1. Developing policies / Thomas R. Peltier -- 2. Organization of information security / Patrick D. Howard -- 3. Cryptology / Maria Dailey -- 4. Risk management : the facilitated risk analysis and assessment process / Thomas R. Peltier -- 5. Building and maintaining an effective security awareness program / John G. O'Leary -- 6. Physical security / John A. Blackley -- 7. Disaster recovery and business continuity planning / Kevin McLaughlin -- 8. Continuity of operations planning / Jeffrey Sauntry -- 9. Access controls / Kimberly Logan -- 10. Information system development, acquisition, and maintenance / Quinn R. Shamblin -- 11. Information security incident management / Brad Smith -- 12. Asset classification / Thomas R. Peltier and William Tompkins -- 13. Threats to information security / Justin Peltier -- 14. Information security policies : a practitioner's view / Charles Johnson."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/725632> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/725632#CreativeWork/information_security_fundamentals> ;
   schema:name "Information security fundamentals"@en ;
   schema:productID "861532574" ;
   schema:url <http://site.ebrary.com/id/10759610> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=639918> ;
   schema:url <http://dx.doi.org/10.1201/b15573> ;
   schema:workExample <http://worldcat.org/isbn/9781439810620> ;
   schema:workExample <http://worldcat.org/isbn/9781439810637> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/861532574> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/725632#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/725632#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/725632#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/65693642> # Thomas R. Peltier
    a schema:Person ;
   schema:familyName "Peltier" ;
   schema:givenName "Thomas R." ;
   schema:name "Thomas R. Peltier" ;
    .

<http://worldcat.org/entity/work/data/725632#CreativeWork/information_security_fundamentals>
    a schema:CreativeWork ;
   rdfs:label "Information security fundamentals" ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/861532574> ; # Information security fundamentals
    .

<http://worldcat.org/isbn/9781439810620>
    a schema:ProductModel ;
   schema:isbn "1439810621" ;
   schema:isbn "9781439810620" ;
    .

<http://worldcat.org/isbn/9781439810637>
    a schema:ProductModel ;
   schema:isbn "143981063X" ;
   schema:isbn "9781439810637" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.