Assessing information security: strategies, tactics, logic and framework
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2010
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from home page (viewed Jan. 4, 2011) Includes bibliographical references Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing, governance, policies and compliance -- Ch. 3. Security assessments classification -- Ch. 4. Advanced pre-assessment planning -- Ch. 5. Security audit strategies and tactics -- Ch. 6. Synthetic evaluation of risks -- Ch. 7. Presenting the outcome and follow-up acts -- Ch. 8. Reviewing security assessment failures and auditor management strategies This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws |
Beschreibung: | 1 Online-Ressource (405 pages) |
ISBN: | 1849280355 1849280363 9781849280358 9781849280365 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043085754 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2010 |||| o||u| ||||||eng d | ||
020 | |a 1849280355 |c Paper |9 1-84928-035-5 | ||
020 | |a 1849280363 |c electronic bk. |9 1-84928-036-3 | ||
020 | |a 9781849280358 |c Paper |9 978-1-84928-035-8 | ||
020 | |a 9781849280365 |c electronic bk. |9 978-1-84928-036-5 | ||
035 | |a (OCoLC)609859930 | ||
035 | |a (DE-599)BVBBV043085754 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Vladimirov, Andrew A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Assessing information security |b strategies, tactics, logic and framework |c A. Vladimirov, K. Gavrilenko, A. Michajlowski |
264 | 1 | |a Ely |b IT Governance Pub. |c 2010 | |
300 | |a 1 Online-Ressource (405 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from home page (viewed Jan. 4, 2011) | ||
500 | |a Includes bibliographical references | ||
500 | |a Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing, governance, policies and compliance -- Ch. 3. Security assessments classification -- Ch. 4. Advanced pre-assessment planning -- Ch. 5. Security audit strategies and tactics -- Ch. 6. Synthetic evaluation of risks -- Ch. 7. Presenting the outcome and follow-up acts -- Ch. 8. Reviewing security assessment failures and auditor management strategies | ||
500 | |a This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws | ||
650 | 4 | |a Computer security | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security / Auditing |2 fast | |
650 | 4 | |a Computer security |x Auditing | |
700 | 1 | |a Gavrilenko, Konstantin V. |e Sonstige |4 oth | |
700 | 1 | |a Mikhailovsky, Andrei A. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028509946 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175481875988480 |
---|---|
any_adam_object | |
author | Vladimirov, Andrew A. |
author_facet | Vladimirov, Andrew A. |
author_role | aut |
author_sort | Vladimirov, Andrew A. |
author_variant | a a v aa aav |
building | Verbundindex |
bvnumber | BV043085754 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)609859930 (DE-599)BVBBV043085754 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02913nmm a2200493zc 4500</leader><controlfield tag="001">BV043085754</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280355</subfield><subfield code="c">Paper</subfield><subfield code="9">1-84928-035-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280363</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-036-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280358</subfield><subfield code="c">Paper</subfield><subfield code="9">978-1-84928-035-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280365</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-036-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609859930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043085754</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vladimirov, Andrew A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Assessing information security</subfield><subfield code="b">strategies, tactics, logic and framework</subfield><subfield code="c">A. Vladimirov, K. Gavrilenko, A. Michajlowski</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (405 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from home page (viewed Jan. 4, 2011)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing, governance, policies and compliance -- Ch. 3. Security assessments classification -- Ch. 4. Advanced pre-assessment planning -- Ch. 5. Security audit strategies and tactics -- Ch. 6. Synthetic evaluation of risks -- Ch. 7. Presenting the outcome and follow-up acts -- Ch. 8. Reviewing security assessment failures and auditor management strategies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Auditing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gavrilenko, Konstantin V.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mikhailovsky, Andrei A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028509946</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043085754 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:59Z |
institution | BVB |
isbn | 1849280355 1849280363 9781849280358 9781849280365 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028509946 |
oclc_num | 609859930 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (405 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Vladimirov, Andrew A. Verfasser aut Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski Ely IT Governance Pub. 2010 1 Online-Ressource (405 pages) txt rdacontent c rdamedia cr rdacarrier Title from home page (viewed Jan. 4, 2011) Includes bibliographical references Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing, governance, policies and compliance -- Ch. 3. Security assessments classification -- Ch. 4. Advanced pre-assessment planning -- Ch. 5. Security audit strategies and tactics -- Ch. 6. Synthetic evaluation of risks -- Ch. 7. Presenting the outcome and follow-up acts -- Ch. 8. Reviewing security assessment failures and auditor management strategies This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / Auditing fast Computer security Auditing Gavrilenko, Konstantin V. Sonstige oth Mikhailovsky, Andrei A. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082 Aggregator Volltext |
spellingShingle | Vladimirov, Andrew A. Assessing information security strategies, tactics, logic and framework Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / Auditing fast Computer security Auditing |
title | Assessing information security strategies, tactics, logic and framework |
title_auth | Assessing information security strategies, tactics, logic and framework |
title_exact_search | Assessing information security strategies, tactics, logic and framework |
title_full | Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski |
title_fullStr | Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski |
title_full_unstemmed | Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski |
title_short | Assessing information security |
title_sort | assessing information security strategies tactics logic and framework |
title_sub | strategies, tactics, logic and framework |
topic | Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / Auditing fast Computer security Auditing |
topic_facet | Computer security COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security / Auditing Computer security Auditing |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391082 |
work_keys_str_mv | AT vladimirovandrewa assessinginformationsecuritystrategiestacticslogicandframework AT gavrilenkokonstantinv assessinginformationsecuritystrategiestacticslogicandframework AT mikhailovskyandreia assessinginformationsecuritystrategiestacticslogicandframework |