Information assurance handbook : effective computer security and risk management strategies (eBook, 2015) []
skip to content
New coming soon
Information assurance handbook : effective computer security and risk management strategies

Information assurance handbook : effective computer security and risk management strategies

Author: Corey Schou; Steven Hernandez
Publisher: New York : McGraw-Hill Education, ©2015.
Edition/Format:   eBook : Document : EnglishView all editions and formats
This handbook discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. It explains how to integrate information assurance into the enterprise planning in a non-technical manner and leads from building an IT strategy that offers an organizational approach to identifying, implementing, and controlling information  Read more...
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Livres électroniques
Handbooks and manuals
Handbooks, manuals, etc
Guides, manuels, etc
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Corey Schou; Steven Hernandez
ISBN: 9780071826310 0071826319
OCLC Number: 898167710
Notes: Titre de l'écran-titre (visionné le 2 mars 2015).
Description: 1 ressource en ligne (1 v.)
Contents: Part IInformation Security Infrastructure1:The Need for Information Security2:Concepts in Informaiton Security3:Assets, Threats, Vulnerabilities, Risks, and Controls4:Security Professionals and Organizations5:Information Security management System6:Implementing Information Security Strategy into Current Practices, Regulations, and PlansPart IIInformation Security Planning Process7:Approaches to Implementing Information Security8:Organizational Structure for Mananging Information Security9:Asset Management10:Information Security Risk Management11:Information Security Policy12:Human Resouce Security13:Certification, Accreditation, and AssurancePart IIIInformation Security Prevention Process14:Information Security in System Development15:Physical and Environmental Security Controls16:Information Security Awareness, Training, and Education17:Preventive Tools and Techniques18:Access ControlPart IVInformation Security Detection Process19:Information Security Monitoring Tools and Methods20:Information Security Measurements and MetricsPart VInformation Security Recovery Process21:Information Security Incident Handling22:Computer Forensics23:Business Continuity24:Backup and RestorationAppendices
Other Titles: Effective computer security and risk management strategies
Responsibility: Corey Schou, Steven Hernandez.


A clear, actionable blueprint for securing the vital information and IT services of global organizations of all sizes, this essential guide contains invaluable best practices technically vetted by a  Read more...


Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.