Information security management principles: an ISEB Certificate / Andy Taylor (editor), David Alexander, Amanda Finch and David Sutton
Material type:
- 9781902505909
- QA 76.9.A5 .A44 2008

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC QA 76.9.A5 .A44 2008 (Browse shelf(Opens below)) | c.1 | Available | NULIB000000168 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9 .K67 2022 SQL server advanced troubleshooting and performance tuning : best practices and techniques / | GC QA 76.9 .M65 2021 SQL cookbook : query solutions and techniques for all SQL users / | GC QA 76.9 .R63 2021 Advanced algorithms and data structures / | GC QA 76.9.A5 .A44 2008 Information security management principles: an ISEB Certificate / | GC QA 76.9.A25 .A54 2019 c.2 Foundations of information security : a straightforward introduction / | GC QA 76.9.A25 .B63 2022 Learn wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using wireshark / | GC QA 76.9.A25 .B83 2011 c.1 Introduction to security and network forensics / |
Includes bibliographical references and index.
Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover
How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming increasingly clear that technological solutions are not the only answer. Research conducted in 2007 suggests that at least 80% of data leakages are caused by staff rather than IT systems (source: Financial Times/Forrester Research, Nov-07). It is clear therefore that Information Security should be viewed as a management function rather than one of IT alone. Here, the authors outline the main management principles designed to help you secure your data, and raise awareness of the issues involved.
There are no comments on this title.