skip to content
The information systems security officer's guide : establishing and managing a cyber security program Preview this item
ClosePreview this item
Checking...

The information systems security officer's guide : establishing and managing a cyber security program

Author: Gerald L Kovacich
Publisher: Waltham, MA : Butterworth-Heinemann, 2016.
Edition/Format:   eBook : Document : English : Third editionView all editions and formats
Summary:
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
(OCoLC)922911114
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Gerald L Kovacich
ISBN: 9780128023792 0128023791
OCLC Number: 935112540
Notes: Includes index.
Description: 1 online resource
Contents: Front Cover; The Information Systems Security Officer's Guide; Copyright; Dedication; Contents; ABOUT THE AUTHOR; OTHER BOOKS AUTHORED OR COAUTHORED BY DR. GERALD L. KOVACICH; Preface; Acknowledgments; INTRODUCTION; WHAT OTHER CYBER SECURITY PROFESSIONALS HAVE TO SAY; William C. Boni; Ed Halibozek; Dr. Andy Jones; Steve Lutz; I --
The Working Environment of the Cyber Security Officer; 1 --
Understanding the Past and Present Cyber-Information World Environment; AH, THE GOOD OL' DAYS!; Understanding Your Information-Driven Environment; GLOBAL INFORMATION INFRASTRUCTURE. NATIONAL INFORMATION INFRASTRUCTURE"Future Shock"; Road Map for the Internet; The Internet: No Traffic Controls; What Has Been the Impact of the Internet?; Organizational Impacts; Using the Internet to Share Information; CHANGING CRIMINAL JUSTICE SYSTEMS; THE HUMAN FACTOR; Laws, Regulations, Standards, and Legal Issues; SUMMARY; 2 --
Understanding the Past and Present Global Business and Management Environment; THE CHANGING BUSINESS AND GOVERNMENT ENVIRONMENTS; UNDERSTANDING THE BUSINESS ENVIRONMENT; MANAGEMENT RESPONSIBILITIES AND COMMUNICATING WITH MANAGEMENT. CREATING A COMPETITIVE ADVANTAGE THROUGH A CYBER SECURITY PROGRAMThe Cyber Security Officer as a Business Manager; SERVICE, SUPPORT, AND A BUSINESS ORIENTATION; BUSINESS MANAGERS AND CYBER SECURITY; WHAT COMPANY MANAGERS SHOULD ASK OF THEIR CYBER SECURITY PROFESSIONALS; WHAT CYBER SECURITY PROFESSIONALS SHOULD DO; QUESTIONS TO CONSIDER; SUMMARY; 3 --
An Overview of Related World Views of Cyber Security; EVOLUTION OF LAWS, STANDARDS, POLICIES, AND PROCEDURES; GLOBAL VIA THE UN; THE EU; International Security in Cyberspace; Internet Governance Developments in 2015. U.S.-EU Cyber Security-Related CooperationASIA; SOUTH AMERICA; AFRICA; UNITED STATES; CNCI Initiative Details; SUMMARY; 4 --
A Glimpse at the History of Technology; WHAT IS TECHNOLOGY?; FROM CAVE MAN TO CYBER SECURITY PROFESSIONAL AND INFORMATION WARRIOR; REVOLUTIONS AND EVOLUTIONS IN HIGH TECHNOLOGY; FROM THE TWENTIETH CENTURY TO TODAY: TECHNOLOGY AND THE ADVENT/ F HIGH TECHNOLOGY; Other Significant Twentieth-Century Technological Developments and Events; High-Tech: A Product, a Process, or Both?; The Trade Association: AEA; The Consulting Group: RFA; Information Provider: One Source. The Research Group: BLSThe Microprocessor; Moore's Law; Other Significant Twentieth Century High-Technology/ evelopments and Events; THE INTERNET; THE HIGH-TECHNOLOGY-DRIVEN PHENOMENON; FASTER AND MORE MASSIVE HIGH-TECHNOLOGY-DRIVEN COMMUNICATIONS; THE BENEFICIAL EFFECT OF HACKER TOOLS AND OTHER MALICIOUS SOFTWARE ON/ ETWORK SECURITY WITH DUAL ROLES AS CYBER SECURITY TOOLS; OTHER HIGH-TECHNOLOGY TOOLS IN CYBER SECURITY; WELCOME TO THE TWENTY-FIRST-CENTURY TECHNOLOGY; SUMMARY; 5 --
Understanding Today's Threats in the Cyber Vapor-"War Stories" from the Front Lines1.
Responsibility: Gerald L. Kovacich.

Abstract:

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

Reviews

Editorial reviews

Publisher Synopsis

"...this book is not just for aspiring cyber security officers - it's also a great read for other professionals in management positions as they should know what cyber security officers do and Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/935112540> # The information systems security officer's guide : establishing and managing a cyber security program
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "935112540" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/800935494#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/800935494#Topic/data_protection> ; # Data protection
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/800935494#Topic/computer_science_general> ; # COMPUTER SCIENCE/General
    schema:author <http://experiment.worldcat.org/entity/work/data/800935494#Person/kovacich_gerald_l> ; # Gerald L. Kovacich
    schema:bookEdition "Third edition." ;
    schema:bookFormat schema:EBook ;
    schema:datePublished "2016" ;
    schema:description "Front Cover; The Information Systems Security Officer's Guide; Copyright; Dedication; Contents; ABOUT THE AUTHOR; OTHER BOOKS AUTHORED OR COAUTHORED BY DR. GERALD L. KOVACICH; Preface; Acknowledgments; INTRODUCTION; WHAT OTHER CYBER SECURITY PROFESSIONALS HAVE TO SAY; William C. Boni; Ed Halibozek; Dr. Andy Jones; Steve Lutz; I -- The Working Environment of the Cyber Security Officer; 1 -- Understanding the Past and Present Cyber-Information World Environment; AH, THE GOOD OL' DAYS!; Understanding Your Information-Driven Environment; GLOBAL INFORMATION INFRASTRUCTURE."@en ;
    schema:description "The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/800935494> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/922911114> ;
    schema:name "The information systems security officer's guide : establishing and managing a cyber security program"@en ;
    schema:productID "935112540" ;
    schema:url <http://0-www.sciencedirect.com.pugwash.lib.warwick.ac.uk/science/book/9780128021903> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=4334673> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=111982> ;
    schema:url <http://proquest.safaribooksonline.com/9780128023792> ;
    schema:url <http://www.sciencedirect.com/science/book/9780128021903> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1143732> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4334673> ;
    schema:url <https://proquest.safaribooksonline.com/9780128023792> ;
    schema:workExample <http://worldcat.org/isbn/9780128023792> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/935112540> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/800935494#Person/kovacich_gerald_l> # Gerald L. Kovacich
    a schema:Person ;
    schema:familyName "Kovacich" ;
    schema:givenName "Gerald L." ;
    schema:name "Gerald L. Kovacich" ;
    .

<http://experiment.worldcat.org/entity/work/data/800935494#Topic/computer_science_general> # COMPUTER SCIENCE/General
    a schema:Intangible ;
    schema:name "COMPUTER SCIENCE/General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/800935494#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://worldcat.org/isbn/9780128023792>
    a schema:ProductModel ;
    schema:isbn "0128023791" ;
    schema:isbn "9780128023792" ;
    .

<http://www.worldcat.org/oclc/922911114>
    a schema:CreativeWork ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/935112540> ; # The information systems security officer's guide : establishing and managing a cyber security program
    .

<http://www.worldcat.org/title/-/oclc/935112540>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/935112540> ; # The information systems security officer's guide : establishing and managing a cyber security program
    schema:dateModified "2018-01-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.