000 02062nam a2200241Ia 4500
003 NULRC
005 20250520102923.0
008 250520s9999 xx 000 0 und d
020 _a9780071821650
040 _cNULRC
050 _aTK 5105.59 .S36 2014
100 _aSchou, Corey
_eauthor
245 0 _aInformation assurance handbook :
_beffective computer security and risk management strategies /
_cCorey Schou and Steven Hernandez
260 _aNew York :
_bMcGraw Hill Education,
_cc2014
300 _avii, 450 pages :
_billustrations ;
_c24 cm.1
365 _bUSD34.99
504 _aIncludes bibliographical references.
505 _aPart I Information Assurance Basics -- Part II Information Assurance Planning Process -- Part III Risk Mitigation Process -- Part IV Information Assurance Detection and Recovery Processes -- Part V Application of Information Assurance to Select Industries.
520 _aInformation Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers anorganizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike. Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems. Chapter-endingcritical thinking exercises reinforce the material covered. An extensive list of scholarly works and international government standards is also provided in this detailed guide.
650 _aCOMPUTER SECURITY
700 _aHernandez, Steven
_eco-author
942 _2lcc
_cREF
999 _c18782
_d18782