Amazon cover image
Image from Amazon.com

Information assurance handbook : effective computer security and risk management strategies / Corey Schou and Steven Hernandez

By: Contributor(s): Material type: TextTextPublication details: New York : McGraw Hill Education, c2014Description: vii, 450 pages : illustrations ; 24 cm.1ISBN:
  • 9780071821650
Subject(s): LOC classification:
  • TK 5105.59 .S36 2014
Contents:
Part I Information Assurance Basics -- Part II Information Assurance Planning Process -- Part III Risk Mitigation Process -- Part IV Information Assurance Detection and Recovery Processes -- Part V Application of Information Assurance to Select Industries.
Summary: Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers anorganizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems. Chapter-endingcritical thinking exercises reinforce the material covered. An extensive list of scholarly works and international government standards is also provided in this detailed guide.
Item type: Books - Reference
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books - Reference Books - Reference National University - Manila LRC - Main Reference Mobile and Web Applications REF TK 5105.59 .S36 2014 (Browse shelf(Opens below)) c.1 Available NULIB000016541

Includes bibliographical references.

Part I Information Assurance Basics -- Part II Information Assurance Planning Process -- Part III Risk Mitigation Process -- Part IV Information Assurance Detection and Recovery Processes -- Part V Application of Information Assurance to Select Industries.

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers anorganizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems. Chapter-endingcritical thinking exercises reinforce the material covered. An extensive list of scholarly works and international government standards is also provided in this detailed guide.

There are no comments on this title.

to post a comment.