Assessing information security: strategies, tactics, logic and framework
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2010
|
Schlagworte: | |
Beschreibung: | 1 online resource (405 pages) illustrations |
ISBN: | 9781849280365 1849280363 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348841 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781849280365 |9 978-1-84928-036-5 | ||
020 | |a 1849280363 |9 1-84928-036-3 | ||
035 | |a (ZDB-4-ITC)ocn609859930 | ||
035 | |a (OCoLC)609859930 | ||
035 | |a (DE-599)BVBBV045348841 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Vladimirov, Andrew A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Assessing information security |b strategies, tactics, logic and framework |c A. Vladimirov, K. Gavrilenko, A. Michajlowski |
264 | 1 | |a Ely |b IT Governance Pub. |c 2010 | |
300 | |a 1 online resource (405 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security / Auditing |2 fast | |
650 | 4 | |a Computer security |x Auditing | |
700 | 1 | |a Gavrilenko, Konstantin V. |e Sonstige |4 oth | |
700 | 1 | |a Mikhailovsky, Andrei A. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781849280358 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735495 |
Datensatz im Suchindex
_version_ | 1804179172242751488 |
---|---|
any_adam_object | |
author | Vladimirov, Andrew A. |
author_facet | Vladimirov, Andrew A. |
author_role | aut |
author_sort | Vladimirov, Andrew A. |
author_variant | a a v aa aav |
building | Verbundindex |
bvnumber | BV045348841 |
collection | ZDB-4-ITC |
contents | This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws |
ctrlnum | (ZDB-4-ITC)ocn609859930 (OCoLC)609859930 (DE-599)BVBBV045348841 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01811nmm a2200397zc 4500</leader><controlfield tag="001">BV045348841</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280365</subfield><subfield code="9">978-1-84928-036-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280363</subfield><subfield code="9">1-84928-036-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn609859930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609859930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348841</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vladimirov, Andrew A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Assessing information security</subfield><subfield code="b">strategies, tactics, logic and framework</subfield><subfield code="c">A. Vladimirov, K. Gavrilenko, A. Michajlowski</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (405 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Auditing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gavrilenko, Konstantin V.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mikhailovsky, Andrei A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781849280358</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735495</subfield></datafield></record></collection> |
id | DE-604.BV045348841 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 9781849280365 1849280363 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735495 |
oclc_num | 609859930 |
open_access_boolean | |
physical | 1 online resource (405 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Vladimirov, Andrew A. Verfasser aut Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski Ely IT Governance Pub. 2010 1 online resource (405 pages) illustrations txt rdacontent c rdamedia cr rdacarrier This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / Auditing fast Computer security Auditing Gavrilenko, Konstantin V. Sonstige oth Mikhailovsky, Andrei A. Sonstige oth Erscheint auch als Druck-Ausgabe 9781849280358 |
spellingShingle | Vladimirov, Andrew A. Assessing information security strategies, tactics, logic and framework This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / Auditing fast Computer security Auditing |
title | Assessing information security strategies, tactics, logic and framework |
title_auth | Assessing information security strategies, tactics, logic and framework |
title_exact_search | Assessing information security strategies, tactics, logic and framework |
title_full | Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski |
title_fullStr | Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski |
title_full_unstemmed | Assessing information security strategies, tactics, logic and framework A. Vladimirov, K. Gavrilenko, A. Michajlowski |
title_short | Assessing information security |
title_sort | assessing information security strategies tactics logic and framework |
title_sub | strategies, tactics, logic and framework |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security / Auditing fast Computer security Auditing |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security / Auditing Computer security Auditing |
work_keys_str_mv | AT vladimirovandrewa assessinginformationsecuritystrategiestacticslogicandframework AT gavrilenkokonstantinv assessinginformationsecuritystrategiestacticslogicandframework AT mikhailovskyandreia assessinginformationsecuritystrategiestacticslogicandframework |