The information systems security officer's guide :: establishing and managing an information protection program /
Clearly addresses the growing need to protect information and information systems in the global marketplace.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Butterworth-Heinemann,
©2003.
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Clearly addresses the growing need to protect information and information systems in the global marketplace. |
Beschreibung: | 1 online resource (xxviii, 361 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080491530 0080491537 9780750676564 0750676566 1281006742 9781281006745 9786611006747 6611006745 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn156887312 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070720s2003 ne a ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d IDEBK |d OCLCQ |d COO |d U5D |d B24X7 |d NTG |d E7B |d AU@ |d MHW |d OCLCQ |d EBLCP |d OCLCQ |d OCLCF |d OCLCQ |d NLGGC |d DEBSZ |d OCLCQ |d AGLDB |d MERUC |d OCLCA |d INARC |d OCLCQ |d VTS |d OCLCQ |d STF |d M8D |d OCLCQ |d SFB |d BRF |d EYM |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 55235832 |a 63117160 |a 271454961 |a 505086768 |a 606023430 |a 648304195 |a 1060189659 |a 1126458346 |a 1179565236 |a 1194774277 | ||
020 | |a 9780080491530 |q (electronic bk.) | ||
020 | |a 0080491537 |q (electronic bk.) | ||
020 | |a 9780750676564 |q (pbk. ; |q alk. paper) | ||
020 | |a 0750676566 |q (pbk. ; |q alk. paper) | ||
020 | |a 1281006742 | ||
020 | |a 9781281006745 | ||
020 | |a 9786611006747 | ||
020 | |a 6611006745 | ||
035 | |a (OCoLC)156887312 |z (OCoLC)55235832 |z (OCoLC)63117160 |z (OCoLC)271454961 |z (OCoLC)505086768 |z (OCoLC)606023430 |z (OCoLC)648304195 |z (OCoLC)1060189659 |z (OCoLC)1126458346 |z (OCoLC)1179565236 |z (OCoLC)1194774277 | ||
037 | |a itpro | ||
050 | 4 | |a QA76.9.A25 |b K68 2003eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Kovacich, Gerald L. |0 http://id.loc.gov/authorities/names/no98094583 | |
245 | 1 | 4 | |a The information systems security officer's guide : |b establishing and managing an information protection program / |c Gerald L. Kovacich. |
250 | |a 2nd ed. | ||
260 | |a Amsterdam ; |a Boston : |b Butterworth-Heinemann, |c ©2003. | ||
300 | |a 1 online resource (xxviii, 361 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO. | |
520 | |a Clearly addresses the growing need to protect information and information systems in the global marketplace. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
758 | |i has work: |a The information systems security officer's guide (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG93wgFxcpC6YwQXWrY773 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Kovacich, Gerald L. |t Information systems security officer's guide. |b 2nd ed. |d Amsterdam ; Boston : Butterworth-Heinemann, ©2003 |z 0750676566 |z 9780750676564 |w (DLC) 2003276409 |w (OCoLC)52458978 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195123 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00003251 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL294684 | ||
938 | |a ebrary |b EBRY |n ebr10186511 | ||
938 | |a EBSCOhost |b EBSC |n 195123 | ||
938 | |a Internet Archive |b INAR |n informationsyste0000kova | ||
938 | |a YBP Library Services |b YANK |n 2586421 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn156887312 |
---|---|
_version_ | 1816881649730715649 |
adam_text | |
any_adam_object | |
author | Kovacich, Gerald L. |
author_GND | http://id.loc.gov/authorities/names/no98094583 |
author_facet | Kovacich, Gerald L. |
author_role | |
author_sort | Kovacich, Gerald L. |
author_variant | g l k gl glk |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 K68 2003eb |
callnumber-search | QA76.9.A25 K68 2003eb |
callnumber-sort | QA 276.9 A25 K68 42003EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO. |
ctrlnum | (OCoLC)156887312 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04539cam a2200709 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn156887312</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070720s2003 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">U5D</subfield><subfield code="d">B24X7</subfield><subfield code="d">NTG</subfield><subfield code="d">E7B</subfield><subfield code="d">AU@</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCA</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">55235832</subfield><subfield code="a">63117160</subfield><subfield code="a">271454961</subfield><subfield code="a">505086768</subfield><subfield code="a">606023430</subfield><subfield code="a">648304195</subfield><subfield code="a">1060189659</subfield><subfield code="a">1126458346</subfield><subfield code="a">1179565236</subfield><subfield code="a">1194774277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080491530</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080491537</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750676564</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750676566</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281006742</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281006745</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611006747</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611006745</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)156887312</subfield><subfield code="z">(OCoLC)55235832</subfield><subfield code="z">(OCoLC)63117160</subfield><subfield code="z">(OCoLC)271454961</subfield><subfield code="z">(OCoLC)505086768</subfield><subfield code="z">(OCoLC)606023430</subfield><subfield code="z">(OCoLC)648304195</subfield><subfield code="z">(OCoLC)1060189659</subfield><subfield code="z">(OCoLC)1126458346</subfield><subfield code="z">(OCoLC)1179565236</subfield><subfield code="z">(OCoLC)1194774277</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">itpro</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">K68 2003eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kovacich, Gerald L.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no98094583</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The information systems security officer's guide :</subfield><subfield code="b">establishing and managing an information protection program /</subfield><subfield code="c">Gerald L. Kovacich.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Butterworth-Heinemann,</subfield><subfield code="c">©2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxviii, 361 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Clearly addresses the growing need to protect information and information systems in the global marketplace.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The information systems security officer's guide (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG93wgFxcpC6YwQXWrY773</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Kovacich, Gerald L.</subfield><subfield code="t">Information systems security officer's guide.</subfield><subfield code="b">2nd ed.</subfield><subfield code="d">Amsterdam ; Boston : Butterworth-Heinemann, ©2003</subfield><subfield code="z">0750676566</subfield><subfield code="z">9780750676564</subfield><subfield code="w">(DLC) 2003276409</subfield><subfield code="w">(OCoLC)52458978</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195123</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00003251</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL294684</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10186511</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">195123</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">informationsyste0000kova</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2586421</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn156887312 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:05Z |
institution | BVB |
isbn | 9780080491530 0080491537 9780750676564 0750676566 1281006742 9781281006745 9786611006747 6611006745 |
language | English |
oclc_num | 156887312 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxviii, 361 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Butterworth-Heinemann, |
record_format | marc |
spelling | Kovacich, Gerald L. http://id.loc.gov/authorities/names/no98094583 The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich. 2nd ed. Amsterdam ; Boston : Butterworth-Heinemann, ©2003. 1 online resource (xxviii, 361 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO. Clearly addresses the growing need to protect information and information systems in the global marketplace. Print version record. English. Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast has work: The information systems security officer's guide (Text) https://id.oclc.org/worldcat/entity/E39PCG93wgFxcpC6YwQXWrY773 https://id.oclc.org/worldcat/ontology/hasWork Print version: Kovacich, Gerald L. Information systems security officer's guide. 2nd ed. Amsterdam ; Boston : Butterworth-Heinemann, ©2003 0750676566 9780750676564 (DLC) 2003276409 (OCoLC)52458978 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195123 Volltext |
spellingShingle | Kovacich, Gerald L. The information systems security officer's guide : establishing and managing an information protection program / Section I: The Working Environment of an ISSO Understanding the Information World Environment Understanding the Business and Management Environment Understanding Today's Threats to Information Assets The International Widget Corporation (IWC) Section II: The Duties and Responsibilities of an ISSO The ISSO's Position, Duties and Responsibilities The InfoSec Strategic, Tactical, and Annual Plans Establishing a CIAPP and InfoSec Organization Determining and Establishing InfoSec Functions Establishing a Metrics Management System Annual Re-Evaluation and Future Plans High Technology Fraud and Other Crimes Investigative Support InfoSec in the Interest of National Security. SECTION III: Global, Professional, and Personal Challenges of an ISSO: The Related World of Information Warfare, Information Operations, and Information Assurance The ISSO and Ethical Conduct ISSO Career Development How to Market Yourself as an ISSO So, Are You Ready to Become an InfoSec Consultant? 21st Century Challenges for the ISSO. Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85035859 https://id.nlm.nih.gov/mesh/D016494 |
title | The information systems security officer's guide : establishing and managing an information protection program / |
title_auth | The information systems security officer's guide : establishing and managing an information protection program / |
title_exact_search | The information systems security officer's guide : establishing and managing an information protection program / |
title_full | The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich. |
title_fullStr | The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich. |
title_full_unstemmed | The information systems security officer's guide : establishing and managing an information protection program / Gerald L. Kovacich. |
title_short | The information systems security officer's guide : |
title_sort | information systems security officer s guide establishing and managing an information protection program |
title_sub | establishing and managing an information protection program / |
topic | Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Data protection fast |
topic_facet | Computer security. Data protection. Computer Security Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Data protection |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195123 |
work_keys_str_mv | AT kovacichgeraldl theinformationsystemssecurityofficersguideestablishingandmanaginganinformationprotectionprogram AT kovacichgeraldl informationsystemssecurityofficersguideestablishingandmanaginganinformationprotectionprogram |