Welcome to UE Central Library

Keep Smiling

Information security management : (Record no. 16531)

MARC details
000 -LEADER
fixed length control field 06138cam a2200229 a 4500
001 - CONTROL NUMBER
control field 15969435
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200908104209.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 091102s2010 flua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781420078541 (hardcover : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1420078542 (hardcover : alk. paper)
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number R142
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Raggad, Bel G.
245 10 - TITLE STATEMENT
Title Information security management :
Remainder of title concepts and practice
Statement of responsibility, etc / Bel G. Raggad.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton, FL :
Name of publisher, distributor, etc CRC Press/Taylor & Francis,
Date of publication, distribution, etc 2010
300 ## - PHYSICAL DESCRIPTION
Extent xxxv, 832 p. :
Other physical details ill. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note "An Auerbach book."
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note INTRODUCTIONIntroduction to Information Security ManagementWhy Information Security MattersInformation Sensitivity ClassificationInformation Security GovernanceThe Computing EnvironmentSecurity of Various Components in the ComputingEnvironmentSecurity InterdependenceCIA TriadSecurity Goals versus Business GoalsThe Security StarParker's View of Information SecurityWhat Is Information Security Management?Defense-In-Depth SecuritySecurity ControlsThe NSA Triad for Security AssessmentIntroduction to Management ConceptsBrief History of ManagementTraditional Management Skills and Security LiteracyManagerial SkillsRedefining Mintzberg's Managerial RolesStrategic Management ConceptsIS Security Management ActivitiesDo We Really Need an Independent Information Security Functional Unit?The Information Security Management CycleIS Security Management versus Functional ManagementThe Information Security Life CycleSecurity Planning in the SLCSecurity AnalysisSecurity DesignSecurity ImplementationSecurity ReviewContinual SecuritySECURITY PLANSecurity PlanSP Development GuidelinesSP MethodologySecurity PolicySecurity Policy, Standards, and GuidelinesSecurity Policy MethodologiesBusiness Continuity PlanningBusiness DisruptionsBusiness ContinuityDisaster RecoveryResponding to Business DisruptionsDeveloping a BCPSECURITY ANALYSISSecurity Risk ManagementThe Risk Management Life CycleThe Preparation Effort for Risk ManagementA Sustainable Security CultureInformation Needed to Manage RisksFactors Affecting Security RiskThe ALE Risk MethodologyOperational, Functional, and Strategic RisksOperational Risk Management: Case of the Naval Safety CenterThe ABLE MethodologyContinual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR)IFEAR MethodologyFault Tree AnalysisEvent Tree AnalysisFTA-ETA IntegrationRisk Management|Simulation and Sensitivity AnalysisActive Security AssessmentStandards for Active Security AssessmentLimits of Active Security AssessmentCan You Hack Your Own System?Ethical Hacking of a Computing EnvironmentEthics in Ethical HackingASA through Penetration TestingStrategies for Active Security AssessmentGuidelines and Terms between Testers and the OrganizationThe Active Security Assessment ProjectSystem AvailabilityComputer ClusteringReview of Cluster ConceptsTypes of ClustersWeb Site AvailabilityApplication Centers No Longer the Only Sound ImplementationComputation of Availability in High-Availability ClusterRelated Availability DefinitionsHow to Obtain Higher Availability: The Cisco Process Nines' AvailabilityCommon Configurations for ClustersSelf-Healing and AvailabilitySECURITY DESIGNNominal Security Enhancement Design Based on ISO/IEC 27002History of the ISO/IEC 27002ISO/IEC 27002How to Use the ISO/IEC 27002 to Enhance SecurityMeasurement and ImplementationsStrategies to Enhance the ISO/IEC 27002-Based Security PostureComparing the ISO/IEC 27002-Based Security Posture Enhancement StrategiesTechnical Security Enhancement Based on ISO/IEC 27001How Organizations Interact with the StandardsGeneral ISMS FrameworkThe ISMS ModelThe Process Approach Ensures the Continual Improvement of the ISMSDevelopment of the Information Security Management SystemDesign of the ISMSSecurity Inventory NeedsThe Integration of ISMS SubsystemsSelf-Assessment for ComplianceRevisiting ISMS ScopingSECURITY IMPLEMENTATIONSecurity SolutionsSecurity SolutionsThe NIST Security Solution TaxonomyThe ISO Security Solution TaxonomyThe Common CriteriaThe Birth of the Common CriteriaCommon Uses of the CCThe CC DocumentThe CC Security ApproachInformation Resource Evaluation MethodologyCC Security Evaluation ProgramsThe American Model of CC Evaluation ProgramsA National ModelSome Other CC Evaluation RequirementsMinicaseSECURITY REVIEWSecurity Review through Security AuditSecurity Audit Means Different Things to Different PeopleSome Security Audit ActivitiesOur Definition of Security AuditMain Features in Security AuditApplication AuditHow Does Security Audit Relate to the Corporate Security Policy?Structure of a Security AuditSecurity Audit versus IT AuditingApplicable Security-Related StandardsSecurity Audit GradesPrivacy Rights, Information Technology, and HIPAAThe Problem of PrivacyThe Meaning of PrivacyHIPAARegulatory Standards: The Privacy RuleThe HIPAA Security RuleAdministrative SafeguardsNIST on HIPAAConducting Effective Risk AnalysisCONTINUAL SECURITYThe Sarbanes-Oxley Act and IT ComplianceMethods of Doing BusinessBackground of the SarbanesOxley ActSarbanesOxley Act of 2002Major Provisions of SOManagement Assessment of Internal Controls and ITComplianceIT ComplianceInternational ResponsesAdvantages to SOX ComplianceForeign Whistleblowers and SOXReconciling SOX and European Conflicting StandardsEU Corporate Governance Initiatives E.U.'s Eighth DirectivePlanning IT Management for SOX: Delayed SOX ImpactCyberterrorism and Homeland SecuritySecurity Economic IntelligenceHomeland SecurityCyberterrorism in the LiteratureCyberterrorism in the Real World: The FBI PerspectiveU.S. Legislative Enactments and Proposed ProgramsU.S. Criminal Statutes Affecting the InternetStatutes and Executive Orders Concerned with CyberterrorismInternational InitiativesIndividual European State Approaches to Security and CounterterrorismOther International EffortsIndexEach chapter begins with an Introduction and concludes with a Summary, Review Questions, Workshops, and References
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 03.12.2018 U.E.24318 005.8 R142 T9912 03.12.2018 03.12.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk