000 | 04059cam a2200577Ii 4500 | ||
---|---|---|---|
001 | 9781003093688 | ||
003 | FlBoTFG | ||
005 | 20240213122824.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210723t20222022flua ob 001 0 eng d | ||
040 |
_aOCoLC-P _beng _erda _epn _cOCoLC-P |
||
020 |
_a9781000449761 _qelectronic publication |
||
020 |
_a1000449769 _qelectronic publication |
||
020 |
_a9781000449716 _qelectronic book |
||
020 |
_a1000449718 _qelectronic book |
||
020 |
_a9781003093688 _qelectronic book |
||
020 |
_a100309368X _qelectronic book |
||
020 |
_z9780367554644 _qhardcover |
||
020 |
_z9780367554651 _qpaperback |
||
020 | _z0367554658 | ||
020 | _z036755464X | ||
024 | 7 |
_a10.1201/9781003093688 _2doi |
|
035 | _a(OCoLC)1264399123 | ||
035 | _a(OCoLC-P)1264399123 | ||
050 | 4 |
_aQA76.9.A25 _bW55 2022 |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
072 | 7 |
_aCOM _x039000 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aUTF _2bicssc |
|
082 | 0 | 4 |
_a658.4/78 _223 |
100 | 1 |
_aWilliams, Walter _c(Telecommunications engineer), _eauthor. |
|
245 | 1 | 0 |
_aCreating an information security program from scratch / _cWalter Williams. |
250 | _aFirst edition. | ||
264 | 1 |
_aBoca Raton : _bCRC Press, _c2022. |
|
264 | 4 | _c©2022 | |
300 |
_a1 online resource (ix, 212 pages) : _billustrations (black and white) |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _a1. Getting started2. The things you must do 3. Asset management 4. Vulnerability Management 5. Incident Management 6. The Endpoint 7. Email Security 8. THE NETWORK 9. Integrating security into software development 10. Disasters 11. Access Control 12. HUMAN ISSUES 13. Maturity 14. INDEX | ||
520 | _aThis book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this bookexplores competing perspectives withan eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 | _aComputer security. | |
650 | 0 |
_aBusiness enterprises _xComputer networks _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Management Information Systems _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Networking / Security _2bisacsh |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003093688 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
999 |
_c4767 _d4767 |