The information systems security officer's guide: establishing and managing an information protection program
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Butterworth-Heinemann
©2003
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO. Clearly addresses the growing need to protect information and information systems in the global marketplace |
Beschreibung: | 1 Online-Ressource (xxviii, 361 pages) |
ISBN: | 0080491537 9780080491530 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043147431 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 0080491537 |c electronic bk. |9 0-08-049153-7 | ||
020 | |a 9780080491530 |c electronic bk. |9 978-0-08-049153-0 | ||
035 | |a (OCoLC)156887312 | ||
035 | |a (DE-599)BVBBV043147431 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Kovacich, Gerald L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The information systems security officer's guide |b establishing and managing an information protection program |c Gerald L. Kovacich |
250 | |a 2nd ed | ||
264 | 1 | |a Amsterdam |b Butterworth-Heinemann |c ©2003 | |
300 | |a 1 Online-Ressource (xxviii, 361 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO. | ||
500 | |a Clearly addresses the growing need to protect information and information systems in the global marketplace | ||
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 0-7506-7656-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-7506-7656-4 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028571622 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175603092422656 |
---|---|
any_adam_object | |
author | Kovacich, Gerald L. |
author_facet | Kovacich, Gerald L. |
author_role | aut |
author_sort | Kovacich, Gerald L. |
author_variant | g l k gl glk |
building | Verbundindex |
bvnumber | BV043147431 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)156887312 (DE-599)BVBBV043147431 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03227nmm a2200505zc 4500</leader><controlfield tag="001">BV043147431</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080491537</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-049153-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080491530</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-049153-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)156887312</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043147431</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kovacich, Gerald L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The information systems security officer's guide</subfield><subfield code="b">establishing and managing an information protection program</subfield><subfield code="c">Gerald L. Kovacich</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">©2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxviii, 361 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Clearly addresses the growing need to protect information and information systems in the global marketplace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">0-7506-7656-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-7506-7656-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028571622</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043147431 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:54Z |
institution | BVB |
isbn | 0080491537 9780080491530 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028571622 |
oclc_num | 156887312 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxviii, 361 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Kovacich, Gerald L. Verfasser aut The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich 2nd ed Amsterdam Butterworth-Heinemann ©2003 1 Online-Ressource (xxviii, 361 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO. Clearly addresses the growing need to protect information and information systems in the global marketplace Sécurité informatique Protection de l'information (Informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Computer security Data protection Erscheint auch als Druck-Ausgabe, Paperback 0-7506-7656-6 Erscheint auch als Druck-Ausgabe, Paperback 978-0-7506-7656-4 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123 Aggregator Volltext |
spellingShingle | Kovacich, Gerald L. The information systems security officer's guide establishing and managing an information protection program Sécurité informatique Protection de l'information (Informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Computer security Data protection |
title | The information systems security officer's guide establishing and managing an information protection program |
title_auth | The information systems security officer's guide establishing and managing an information protection program |
title_exact_search | The information systems security officer's guide establishing and managing an information protection program |
title_full | The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich |
title_fullStr | The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich |
title_full_unstemmed | The information systems security officer's guide establishing and managing an information protection program Gerald L. Kovacich |
title_short | The information systems security officer's guide |
title_sort | the information systems security officer s guide establishing and managing an information protection program |
title_sub | establishing and managing an information protection program |
topic | Sécurité informatique Protection de l'information (Informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Data protection fast Computer security Data protection |
topic_facet | Sécurité informatique Protection de l'information (Informatique) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Data protection |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=195123 |
work_keys_str_mv | AT kovacichgeraldl theinformationsystemssecurityofficersguideestablishingandmanaginganinformationprotectionprogram |