Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress L. P.
2023
|
Ausgabe: | 1st ed |
Online-Zugang: | DE-2070s |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (158 Seiten) |
ISBN: | 9781484297421 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV050100636 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 241218s2023 xx o|||| 00||| eng d | ||
020 | |a 9781484297421 |9 978-1-4842-9742-1 | ||
035 | |a (ZDB-30-PQE)EBC30751936 | ||
035 | |a (ZDB-30-PAD)EBC30751936 | ||
035 | |a (ZDB-89-EBL)EBL30751936 | ||
035 | |a (OCoLC)1400202956 | ||
035 | |a (DE-599)BVBBV050100636 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 658.1550285 | |
100 | 1 | |a Fowler, Bradley |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information Assurance and Risk Management Strategies |b Manage Your Information Systems and Tools in the Cloud |
250 | |a 1st ed | ||
264 | 1 | |a Berkeley, CA |b Apress L. P. |c 2023 | |
264 | 4 | |c ©2023 | |
300 | |a 1 Online-Ressource (158 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Introduction -- Chapter 1: Information Assurance Analysis -- Information Assurance Primer -- Analysis One -- Analysis Two -- Analysis Three -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 2: Information Risk Management and Analysis Strategies -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 3: Policy Compliance Strategies -- Who Is Berkshire Hathaway? -- Privacy Issues Impacting Berkshire Hathaway -- Privacy Compliance Risks Profile -- Privacy Compliance Controls Profile -- Privacy Compliance Risk Mitigation Strategy -- Recommendations and Conclusions -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 4: AWS Cloud Intrusion Detection and Prevention -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 5: Enterprise Architecture IT Strategies -- Team Management -- Disruptive Technology -- Change Management -- IT Value Creation -- Vendor Management -- Enterprise Architecture Artifacts -- Enterprise Architecture Vision -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 6: IT Strategy Policy -- Berkshire Hathaway's Policy Life Cycle -- Step 1: Setting an Agenda -- Step 2: Policy Formulation -- Step 3: Making Decisions -- Step 4: Policy Implementation -- Step 5: Monitor and Evaluate -- Step 6: Policy Framework -- Acceptable Use Policy -- Access Control Policy -- Mobile Device Usage Policy -- Change Management Policy -- Scope -- Information Security Policy -- Remote Access Policy -- Email Communication and Security Policy -- Email Security Policy -- Data Management Policy -- Documentation Policy -- Disaster Recovery Policy -- Policy Management Tools -- IT Guidelines -- IT Procedures -- IT Standards -- IT Policies -- IT Policies Implementation and Issues | |
505 | 8 | |a Policy Compliance with a Report Card -- Policy Enforcement -- Summary -- Discussion Questions -- Keywords -- Glossary -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- References -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Index | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Fowler, Bradley |t Information Assurance and Risk Management Strategies |d Berkeley, CA : Apress L. P.,c2023 |z 9781484297414 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035437798 | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=30751936 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1818760560665165824 |
---|---|
adam_text | |
any_adam_object | |
author | Fowler, Bradley |
author_facet | Fowler, Bradley |
author_role | aut |
author_sort | Fowler, Bradley |
author_variant | b f bf |
building | Verbundindex |
bvnumber | BV050100636 |
collection | ZDB-30-PQE |
contents | Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Introduction -- Chapter 1: Information Assurance Analysis -- Information Assurance Primer -- Analysis One -- Analysis Two -- Analysis Three -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 2: Information Risk Management and Analysis Strategies -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 3: Policy Compliance Strategies -- Who Is Berkshire Hathaway? -- Privacy Issues Impacting Berkshire Hathaway -- Privacy Compliance Risks Profile -- Privacy Compliance Controls Profile -- Privacy Compliance Risk Mitigation Strategy -- Recommendations and Conclusions -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 4: AWS Cloud Intrusion Detection and Prevention -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 5: Enterprise Architecture IT Strategies -- Team Management -- Disruptive Technology -- Change Management -- IT Value Creation -- Vendor Management -- Enterprise Architecture Artifacts -- Enterprise Architecture Vision -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 6: IT Strategy Policy -- Berkshire Hathaway's Policy Life Cycle -- Step 1: Setting an Agenda -- Step 2: Policy Formulation -- Step 3: Making Decisions -- Step 4: Policy Implementation -- Step 5: Monitor and Evaluate -- Step 6: Policy Framework -- Acceptable Use Policy -- Access Control Policy -- Mobile Device Usage Policy -- Change Management Policy -- Scope -- Information Security Policy -- Remote Access Policy -- Email Communication and Security Policy -- Email Security Policy -- Data Management Policy -- Documentation Policy -- Disaster Recovery Policy -- Policy Management Tools -- IT Guidelines -- IT Procedures -- IT Standards -- IT Policies -- IT Policies Implementation and Issues Policy Compliance with a Report Card -- Policy Enforcement -- Summary -- Discussion Questions -- Keywords -- Glossary -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- References -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Index |
ctrlnum | (ZDB-30-PQE)EBC30751936 (ZDB-30-PAD)EBC30751936 (ZDB-89-EBL)EBL30751936 (OCoLC)1400202956 (DE-599)BVBBV050100636 |
dewey-full | 658.1550285 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.1550285 |
dewey-search | 658.1550285 |
dewey-sort | 3658.1550285 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV050100636</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">241218s2023 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484297421</subfield><subfield code="9">978-1-4842-9742-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC30751936</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC30751936</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL30751936</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1400202956</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050100636</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.1550285</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fowler, Bradley</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Assurance and Risk Management Strategies</subfield><subfield code="b">Manage Your Information Systems and Tools in the Cloud</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress L. P.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (158 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Introduction -- Chapter 1: Information Assurance Analysis -- Information Assurance Primer -- Analysis One -- Analysis Two -- Analysis Three -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 2: Information Risk Management and Analysis Strategies -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 3: Policy Compliance Strategies -- Who Is Berkshire Hathaway? -- Privacy Issues Impacting Berkshire Hathaway -- Privacy Compliance Risks Profile -- Privacy Compliance Controls Profile -- Privacy Compliance Risk Mitigation Strategy -- Recommendations and Conclusions -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 4: AWS Cloud Intrusion Detection and Prevention -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 5: Enterprise Architecture IT Strategies -- Team Management -- Disruptive Technology -- Change Management -- IT Value Creation -- Vendor Management -- Enterprise Architecture Artifacts -- Enterprise Architecture Vision -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 6: IT Strategy Policy -- Berkshire Hathaway's Policy Life Cycle -- Step 1: Setting an Agenda -- Step 2: Policy Formulation -- Step 3: Making Decisions -- Step 4: Policy Implementation -- Step 5: Monitor and Evaluate -- Step 6: Policy Framework -- Acceptable Use Policy -- Access Control Policy -- Mobile Device Usage Policy -- Change Management Policy -- Scope -- Information Security Policy -- Remote Access Policy -- Email Communication and Security Policy -- Email Security Policy -- Data Management Policy -- Documentation Policy -- Disaster Recovery Policy -- Policy Management Tools -- IT Guidelines -- IT Procedures -- IT Standards -- IT Policies -- IT Policies Implementation and Issues</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Policy Compliance with a Report Card -- Policy Enforcement -- Summary -- Discussion Questions -- Keywords -- Glossary -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- References -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Index</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Fowler, Bradley</subfield><subfield code="t">Information Assurance and Risk Management Strategies</subfield><subfield code="d">Berkeley, CA : Apress L. P.,c2023</subfield><subfield code="z">9781484297414</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035437798</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=30751936</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050100636 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T07:00:34Z |
institution | BVB |
isbn | 9781484297421 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035437798 |
oclc_num | 1400202956 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (158 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Apress L. P. |
record_format | marc |
spelling | Fowler, Bradley Verfasser aut Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud 1st ed Berkeley, CA Apress L. P. 2023 ©2023 1 Online-Ressource (158 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Introduction -- Chapter 1: Information Assurance Analysis -- Information Assurance Primer -- Analysis One -- Analysis Two -- Analysis Three -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 2: Information Risk Management and Analysis Strategies -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 3: Policy Compliance Strategies -- Who Is Berkshire Hathaway? -- Privacy Issues Impacting Berkshire Hathaway -- Privacy Compliance Risks Profile -- Privacy Compliance Controls Profile -- Privacy Compliance Risk Mitigation Strategy -- Recommendations and Conclusions -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 4: AWS Cloud Intrusion Detection and Prevention -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 5: Enterprise Architecture IT Strategies -- Team Management -- Disruptive Technology -- Change Management -- IT Value Creation -- Vendor Management -- Enterprise Architecture Artifacts -- Enterprise Architecture Vision -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 6: IT Strategy Policy -- Berkshire Hathaway's Policy Life Cycle -- Step 1: Setting an Agenda -- Step 2: Policy Formulation -- Step 3: Making Decisions -- Step 4: Policy Implementation -- Step 5: Monitor and Evaluate -- Step 6: Policy Framework -- Acceptable Use Policy -- Access Control Policy -- Mobile Device Usage Policy -- Change Management Policy -- Scope -- Information Security Policy -- Remote Access Policy -- Email Communication and Security Policy -- Email Security Policy -- Data Management Policy -- Documentation Policy -- Disaster Recovery Policy -- Policy Management Tools -- IT Guidelines -- IT Procedures -- IT Standards -- IT Policies -- IT Policies Implementation and Issues Policy Compliance with a Report Card -- Policy Enforcement -- Summary -- Discussion Questions -- Keywords -- Glossary -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- References -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Index Erscheint auch als Druck-Ausgabe Fowler, Bradley Information Assurance and Risk Management Strategies Berkeley, CA : Apress L. P.,c2023 9781484297414 |
spellingShingle | Fowler, Bradley Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Introduction -- Chapter 1: Information Assurance Analysis -- Information Assurance Primer -- Analysis One -- Analysis Two -- Analysis Three -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 2: Information Risk Management and Analysis Strategies -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 3: Policy Compliance Strategies -- Who Is Berkshire Hathaway? -- Privacy Issues Impacting Berkshire Hathaway -- Privacy Compliance Risks Profile -- Privacy Compliance Controls Profile -- Privacy Compliance Risk Mitigation Strategy -- Recommendations and Conclusions -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 4: AWS Cloud Intrusion Detection and Prevention -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 5: Enterprise Architecture IT Strategies -- Team Management -- Disruptive Technology -- Change Management -- IT Value Creation -- Vendor Management -- Enterprise Architecture Artifacts -- Enterprise Architecture Vision -- Case Study -- Summary -- Discussion Questions -- Keywords -- Chapter 6: IT Strategy Policy -- Berkshire Hathaway's Policy Life Cycle -- Step 1: Setting an Agenda -- Step 2: Policy Formulation -- Step 3: Making Decisions -- Step 4: Policy Implementation -- Step 5: Monitor and Evaluate -- Step 6: Policy Framework -- Acceptable Use Policy -- Access Control Policy -- Mobile Device Usage Policy -- Change Management Policy -- Scope -- Information Security Policy -- Remote Access Policy -- Email Communication and Security Policy -- Email Security Policy -- Data Management Policy -- Documentation Policy -- Disaster Recovery Policy -- Policy Management Tools -- IT Guidelines -- IT Procedures -- IT Standards -- IT Policies -- IT Policies Implementation and Issues Policy Compliance with a Report Card -- Policy Enforcement -- Summary -- Discussion Questions -- Keywords -- Glossary -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- References -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Index |
title | Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud |
title_auth | Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud |
title_exact_search | Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud |
title_full | Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud |
title_fullStr | Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud |
title_full_unstemmed | Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud |
title_short | Information Assurance and Risk Management Strategies |
title_sort | information assurance and risk management strategies manage your information systems and tools in the cloud |
title_sub | Manage Your Information Systems and Tools in the Cloud |
work_keys_str_mv | AT fowlerbradley informationassuranceandriskmanagementstrategiesmanageyourinformationsystemsandtoolsinthecloud |