Security architect :: careers in information security /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London :
BCS,
2014.
|
Schriftenreihe: | BCS guides to IT roles
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781780172224 1780172222 1780172214 9781780172217 1780172230 9781780172231 9781780172200 1780172206 9781322099316 1322099316 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn881023458 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 140724s2014 enk job 001 0 eng d | ||
040 | |a UKMGB |b eng |e pn |c UKMGB |d OCLCF |d IDEBK |d E7B |d CDX |d N$T |d REB |d COO |d B24X7 |d OCLCQ |d OCLCO |d OCLCQ |d TJC |d OCLCO |d OCLCA |d DEBSZ |d OCLCQ |d D6H |d COCUF |d CNNOR |d MOR |d CCO |d PIFAG |d OCLCQ |d U3W |d OCLCA |d STF |d INT |d MOQ |d AU@ |d OCLCQ |d G3B |d TKN |d OCLCQ |d UKAHL |d OCLCQ |d VT2 |d BCSLD |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d OCLCQ |d HOPLA |d OCLCQ | ||
016 | 7 | |a 016816448 |2 Uk | |
016 | 7 | |a 016733945 |2 Uk | |
020 | |a 9781780172224 |q (electronic bk.) | ||
020 | |a 1780172222 |q (electronic bk.) | ||
020 | |a 1780172214 |q (electronic bk.) | ||
020 | |a 9781780172217 |q (electronic bk.) | ||
020 | |a 1780172230 |q (electronic bk.) | ||
020 | |a 9781780172231 |q (electronic bk.) | ||
020 | |a 9781780172200 | ||
020 | |a 1780172206 | ||
020 | |a 9781322099316 | ||
020 | |a 1322099316 | ||
035 | |a (OCoLC)881023458 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Collins, Jon |c (Information technology manager), |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjv7KrfXvJpWcJVGhQtBT3 | |
245 | 1 | 0 | |a Security architect : |b careers in information security / |c by Jon Collins. |
264 | 1 | |a London : |b BCS, |c 2014. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 0 | |a BCS guides to IT roles | |
588 | 0 | |a CIP data; item not viewed. | |
520 | 8 | |a Annotation |b Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. This book gives practical career guidance to those interested in the security architect role. It covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Advert Page; Copyright; CONTENTS; LIST OF FIGURES; AUTHOR'S NOTE; ACKNOWLEDGEMENTS; ABBREVIATIONS; GLOSSARY; PREFACE; 1 INTRODUCTION; THE ESSENCE OF SECURITY ARCHITECTURE; THE AIM OF THIS BOOK; CAVEATS; 2 INFORMATION SECURITY ARCHITECTURE FUNDAMENTALS; INFORMATION SECURITY IN A CHANGING WORLD; OVERVIEW OF INFORMATION SECURITY CONCEPTS; THE ROLE OF IT AND ENTERPRISE ARCHITECTURE IN INFORMATION SECURITY; INTRODUCING INFORMATION SECURITY ARCHITECTURE; THE ROLE OF THE BUSINESS IN THE SECURITY ARCHITECTURE; 3 INFORMATION SECURITY ARCHITECTURE ACTIVITIES; COLLATION; SCOPING. | |
505 | 8 | |a Threat and vulnerability assessmentassessment of existing controls; domain definition; specification of controls; evaluation of options; business case; implementation; monitoring and review; 4 the security architect's role and skill set; security skills; technical skills; business skills; 5 standards, tools and techniques; standards, guidelines and regulations; security testing tools and techniques; security architecture operations; 6 career progression and related roles; certification and continuous professional development; interface and dependencies. | |
505 | 8 | |a 7 A DAY IN THE LIFE OF A SECURITY ARCHITECT8 CONCLUSION; APPENDIX SECURITY ARCHITECTURE DOCUMENT REVIEW CHECKLIST; REFERENCES; FURTHER READING; INDEX; Advert Page; Back Cover. | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Electronic data processing departments |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh85042310 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Centres de traitement de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a Computing: general. |2 bicssc | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Advice on careers & achieving success. |2 bicssc | |
650 | 7 | |a Corporate governance & responsibilities. |2 bicssc | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Electronic data processing departments |x Security measures |2 fast | |
650 | 7 | |a Information technology: general topics. |2 thema | |
650 | 7 | |a Computer security. |2 thema | |
650 | 7 | |a Advice on careers & achieving success. |2 thema | |
650 | 7 | |a Corporate governance: role & responsibilities of boards & directors. |2 thema | |
710 | 2 | |a British Computer Society. |0 http://id.loc.gov/authorities/names/n79056431 | |
758 | |i has work: |a Security architect (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG9tCCHw97VyWDXTYhvM4C |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9781780172200 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=788937 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a hoopla Digital |b HOPL |n MWT14728057 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26745129 | ||
938 | |a Books 24x7 |b B247 |n bks00064608 | ||
938 | |a BCS, The Chartered Institute for IT |b BCSL |n 9781780172217 | ||
938 | |a Coutts Information Services |b COUT |n 29748589 | ||
938 | |a ebrary |b EBRY |n ebr10927592 | ||
938 | |a EBSCOhost |b EBSC |n 788937 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis29748589 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn881023458 |
---|---|
_version_ | 1816796913821810688 |
adam_text | |
any_adam_object | |
author | Collins, Jon (Information technology manager) |
author_corporate | British Computer Society |
author_corporate_role | |
author_facet | Collins, Jon (Information technology manager) British Computer Society |
author_role | aut |
author_sort | Collins, Jon (Information technology manager) |
author_variant | j c jc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBU |
contents | Cover; Advert Page; Copyright; CONTENTS; LIST OF FIGURES; AUTHOR'S NOTE; ACKNOWLEDGEMENTS; ABBREVIATIONS; GLOSSARY; PREFACE; 1 INTRODUCTION; THE ESSENCE OF SECURITY ARCHITECTURE; THE AIM OF THIS BOOK; CAVEATS; 2 INFORMATION SECURITY ARCHITECTURE FUNDAMENTALS; INFORMATION SECURITY IN A CHANGING WORLD; OVERVIEW OF INFORMATION SECURITY CONCEPTS; THE ROLE OF IT AND ENTERPRISE ARCHITECTURE IN INFORMATION SECURITY; INTRODUCING INFORMATION SECURITY ARCHITECTURE; THE ROLE OF THE BUSINESS IN THE SECURITY ARCHITECTURE; 3 INFORMATION SECURITY ARCHITECTURE ACTIVITIES; COLLATION; SCOPING. Threat and vulnerability assessmentassessment of existing controls; domain definition; specification of controls; evaluation of options; business case; implementation; monitoring and review; 4 the security architect's role and skill set; security skills; technical skills; business skills; 5 standards, tools and techniques; standards, guidelines and regulations; security testing tools and techniques; security architecture operations; 6 career progression and related roles; certification and continuous professional development; interface and dependencies. 7 A DAY IN THE LIFE OF A SECURITY ARCHITECT8 CONCLUSION; APPENDIX SECURITY ARCHITECTURE DOCUMENT REVIEW CHECKLIST; REFERENCES; FURTHER READING; INDEX; Advert Page; Back Cover. |
ctrlnum | (OCoLC)881023458 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05878cam a2200913 a 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn881023458</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">140724s2014 enk job 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UKMGB</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UKMGB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">CDX</subfield><subfield code="d">N$T</subfield><subfield code="d">REB</subfield><subfield code="d">COO</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TJC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">CCO</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">INT</subfield><subfield code="d">MOQ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">BCSLD</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HOPLA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">016816448</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">016733945</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780172224</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780172222</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780172214</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780172217</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780172230</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780172231</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780172200</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780172206</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322099316</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1322099316</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881023458</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Collins, Jon</subfield><subfield code="c">(Information technology manager),</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjv7KrfXvJpWcJVGhQtBT3</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security architect :</subfield><subfield code="b">careers in information security /</subfield><subfield code="c">by Jon Collins.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">BCS,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">BCS guides to IT roles</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">CIP data; item not viewed.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. This book gives practical career guidance to those interested in the security architect role. It covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Advert Page; Copyright; CONTENTS; LIST OF FIGURES; AUTHOR'S NOTE; ACKNOWLEDGEMENTS; ABBREVIATIONS; GLOSSARY; PREFACE; 1 INTRODUCTION; THE ESSENCE OF SECURITY ARCHITECTURE; THE AIM OF THIS BOOK; CAVEATS; 2 INFORMATION SECURITY ARCHITECTURE FUNDAMENTALS; INFORMATION SECURITY IN A CHANGING WORLD; OVERVIEW OF INFORMATION SECURITY CONCEPTS; THE ROLE OF IT AND ENTERPRISE ARCHITECTURE IN INFORMATION SECURITY; INTRODUCING INFORMATION SECURITY ARCHITECTURE; THE ROLE OF THE BUSINESS IN THE SECURITY ARCHITECTURE; 3 INFORMATION SECURITY ARCHITECTURE ACTIVITIES; COLLATION; SCOPING.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Threat and vulnerability assessmentassessment of existing controls; domain definition; specification of controls; evaluation of options; business case; implementation; monitoring and review; 4 the security architect's role and skill set; security skills; technical skills; business skills; 5 standards, tools and techniques; standards, guidelines and regulations; security testing tools and techniques; security architecture operations; 6 career progression and related roles; certification and continuous professional development; interface and dependencies.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7 A DAY IN THE LIFE OF A SECURITY ARCHITECT8 CONCLUSION; APPENDIX SECURITY ARCHITECTURE DOCUMENT REVIEW CHECKLIST; REFERENCES; FURTHER READING; INDEX; Advert Page; Back Cover.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042310</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Centres de traitement de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computing: general.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Advice on careers & achieving success.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporate governance & responsibilities.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology: general topics.</subfield><subfield code="2">thema</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">thema</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Advice on careers & achieving success.</subfield><subfield code="2">thema</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporate governance: role & responsibilities of boards & directors.</subfield><subfield code="2">thema</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">British Computer Society.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n79056431</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security architect (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG9tCCHw97VyWDXTYhvM4C</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9781780172200</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=788937</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">hoopla Digital</subfield><subfield code="b">HOPL</subfield><subfield code="n">MWT14728057</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26745129</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00064608</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">BCS, The Chartered Institute for IT</subfield><subfield code="b">BCSL</subfield><subfield code="n">9781780172217</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">29748589</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10927592</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">788937</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis29748589</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-ocn881023458 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:14Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n79056431 |
isbn | 9781780172224 1780172222 1780172214 9781780172217 1780172230 9781780172231 9781780172200 1780172206 9781322099316 1322099316 |
language | English |
oclc_num | 881023458 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBU |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | BCS, |
record_format | marc |
series2 | BCS guides to IT roles |
spelling | Collins, Jon (Information technology manager), author. https://id.oclc.org/worldcat/entity/E39PCjv7KrfXvJpWcJVGhQtBT3 Security architect : careers in information security / by Jon Collins. London : BCS, 2014. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier BCS guides to IT roles CIP data; item not viewed. Annotation Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. This book gives practical career guidance to those interested in the security architect role. It covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks. Includes bibliographical references and index. Cover; Advert Page; Copyright; CONTENTS; LIST OF FIGURES; AUTHOR'S NOTE; ACKNOWLEDGEMENTS; ABBREVIATIONS; GLOSSARY; PREFACE; 1 INTRODUCTION; THE ESSENCE OF SECURITY ARCHITECTURE; THE AIM OF THIS BOOK; CAVEATS; 2 INFORMATION SECURITY ARCHITECTURE FUNDAMENTALS; INFORMATION SECURITY IN A CHANGING WORLD; OVERVIEW OF INFORMATION SECURITY CONCEPTS; THE ROLE OF IT AND ENTERPRISE ARCHITECTURE IN INFORMATION SECURITY; INTRODUCING INFORMATION SECURITY ARCHITECTURE; THE ROLE OF THE BUSINESS IN THE SECURITY ARCHITECTURE; 3 INFORMATION SECURITY ARCHITECTURE ACTIVITIES; COLLATION; SCOPING. Threat and vulnerability assessmentassessment of existing controls; domain definition; specification of controls; evaluation of options; business case; implementation; monitoring and review; 4 the security architect's role and skill set; security skills; technical skills; business skills; 5 standards, tools and techniques; standards, guidelines and regulations; security testing tools and techniques; security architecture operations; 6 career progression and related roles; certification and continuous professional development; interface and dependencies. 7 A DAY IN THE LIFE OF A SECURITY ARCHITECT8 CONCLUSION; APPENDIX SECURITY ARCHITECTURE DOCUMENT REVIEW CHECKLIST; REFERENCES; FURTHER READING; INDEX; Advert Page; Back Cover. Computer security Management. Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique Gestion. Centres de traitement de l'information Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Computing: general. bicssc Computer security. bicssc Advice on careers & achieving success. bicssc Corporate governance & responsibilities. bicssc COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security Management fast Electronic data processing departments Security measures fast Information technology: general topics. thema Computer security. thema Advice on careers & achieving success. thema Corporate governance: role & responsibilities of boards & directors. thema British Computer Society. http://id.loc.gov/authorities/names/n79056431 has work: Security architect (Text) https://id.oclc.org/worldcat/entity/E39PCG9tCCHw97VyWDXTYhvM4C https://id.oclc.org/worldcat/ontology/hasWork Print version: 9781780172200 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=788937 Volltext |
spellingShingle | Collins, Jon (Information technology manager) Security architect : careers in information security / Cover; Advert Page; Copyright; CONTENTS; LIST OF FIGURES; AUTHOR'S NOTE; ACKNOWLEDGEMENTS; ABBREVIATIONS; GLOSSARY; PREFACE; 1 INTRODUCTION; THE ESSENCE OF SECURITY ARCHITECTURE; THE AIM OF THIS BOOK; CAVEATS; 2 INFORMATION SECURITY ARCHITECTURE FUNDAMENTALS; INFORMATION SECURITY IN A CHANGING WORLD; OVERVIEW OF INFORMATION SECURITY CONCEPTS; THE ROLE OF IT AND ENTERPRISE ARCHITECTURE IN INFORMATION SECURITY; INTRODUCING INFORMATION SECURITY ARCHITECTURE; THE ROLE OF THE BUSINESS IN THE SECURITY ARCHITECTURE; 3 INFORMATION SECURITY ARCHITECTURE ACTIVITIES; COLLATION; SCOPING. Threat and vulnerability assessmentassessment of existing controls; domain definition; specification of controls; evaluation of options; business case; implementation; monitoring and review; 4 the security architect's role and skill set; security skills; technical skills; business skills; 5 standards, tools and techniques; standards, guidelines and regulations; security testing tools and techniques; security architecture operations; 6 career progression and related roles; certification and continuous professional development; interface and dependencies. 7 A DAY IN THE LIFE OF A SECURITY ARCHITECT8 CONCLUSION; APPENDIX SECURITY ARCHITECTURE DOCUMENT REVIEW CHECKLIST; REFERENCES; FURTHER READING; INDEX; Advert Page; Back Cover. Computer security Management. Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique Gestion. Centres de traitement de l'information Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Computing: general. bicssc Computer security. bicssc Advice on careers & achieving success. bicssc Corporate governance & responsibilities. bicssc COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security Management fast Electronic data processing departments Security measures fast Information technology: general topics. thema Computer security. thema Advice on careers & achieving success. thema Corporate governance: role & responsibilities of boards & directors. thema |
subject_GND | http://id.loc.gov/authorities/subjects/sh85042310 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Security architect : careers in information security / |
title_auth | Security architect : careers in information security / |
title_exact_search | Security architect : careers in information security / |
title_full | Security architect : careers in information security / by Jon Collins. |
title_fullStr | Security architect : careers in information security / by Jon Collins. |
title_full_unstemmed | Security architect : careers in information security / by Jon Collins. |
title_short | Security architect : |
title_sort | security architect careers in information security |
title_sub | careers in information security / |
topic | Computer security Management. Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Sécurité informatique Gestion. Centres de traitement de l'information Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Computing: general. bicssc Computer security. bicssc Advice on careers & achieving success. bicssc Corporate governance & responsibilities. bicssc COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security Management fast Electronic data processing departments Security measures fast Information technology: general topics. thema Computer security. thema Advice on careers & achieving success. thema Corporate governance: role & responsibilities of boards & directors. thema |
topic_facet | Computer security Management. Electronic data processing departments Security measures. Computer networks Security measures. Sécurité informatique Gestion. Centres de traitement de l'information Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Computing: general. Computer security. Advice on careers & achieving success. Corporate governance & responsibilities. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Management Electronic data processing departments Security measures Information technology: general topics. Corporate governance: role & responsibilities of boards & directors. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=788937 |
work_keys_str_mv | AT collinsjon securityarchitectcareersininformationsecurity AT britishcomputersociety securityarchitectcareersininformationsecurity |