Normal view MARC view ISBD view

Information assurance handbook : effective computer security and risk management strategies /

by Schou, Corey.
, effective computer security and risk management strategies /
Additional authors: Hernandez, Steven.
Published by : McGraw-Hill Education, (New York ; | Mexico City :) Physical details: xxix, 450 pages : illustrations ; 24 cm. ISBN:9780071821650 (paperback); 0071821651 (paperback).
Subject(s): Computer networks -- Security measures -- Handbooks, manuals, etc. | Computer security -- Handbooks, manuals, etc. | Data protection -- Handbooks, manuals, etc. | Information storage and retrieval systems -- Security measures -- Handbooks, manuals, etc.
Year: 2015
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Copy number Status Notes Date due Barcode
Reserve Collection
Non-fiction TK5105.59 .S365 2015 (Browse shelf) c. 1 In-library use only This textbook is in-library use only a31111000035999

Includes bibliographical references and index.

Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.

"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--

There are no comments for this item.

Log in to your account to post a comment.
Your library | Borrowing books | Borrowing laptops | Borrowing iPads | Borrowing kindles | Contact Effat Library Facebook page New Books RSS Feed Effat University | LinkedIn
Copyright © 2013 Effat University Library, P.O.BOX 34689, JEDDAH 21478, Saudi Arabia, Tel. +966 2 636 4300 Webmaster