000 02996cam a2200397 i 4500
999 _c50264
_d50264
001 17787144
003 CITU
005 20240216122605.0
008 130621s2014 flua b 001 0 eng
010 _a 2013023074
020 _a9781439810620 (pbk. : acidfree paper)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bP427 2014
082 0 0 _a005.8
_223
084 _aBUS073000
_aCOM032000
_aCOM053000
_2bisacsh
100 1 _aPeltier, Thomas R.
245 1 0 _aInformation security fundamentals /
_cThomas R. Peltier.
250 _aSecond edition.
264 1 _aBoca Raton, [Florida] :
_bCRC Press, Taylor & Francis Group,
_c[2014]
300 _axxx, 408 pages :
_billustrations ;
_c24 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"--
_cProvided by publisher.
650 0 _aComputer security.
650 0 _aData protection.
650 7 _aBUSINESS & ECONOMICS / Commerce.
_2bisacsh
650 7 _aCOMPUTERS / Information Technology.
_2bisacsh
650 7 _aCOMPUTERS / Security / General.
_2bisacsh
856 4 2 _3Cover image
_uhttp://images.tandf.co.uk/common/jackets/websmall/978143981/9781439810620.jpg
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_01