Information security management handbook (Record no. 32924)

000 -LEADER
fixed length control field 02423 a2200193 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0849374952
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780849374951
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number INF
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tipton, Harold F.
9 (RLIN) 915
245 10 - TITLE STATEMENT
Title Information security management handbook
Statement of responsibility, etc. Harold F. Tipton
250 ## - EDITION STATEMENT
Edition statement 6th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Boca Raton
Name of publisher, distributor, etc. CRC
Date of publication, distribution, etc. 2007
300 ## - PHYSICAL DESCRIPTION
Extent 3231p.
500 ## - GENERAL NOTE
General note HB
520 ## - SUMMARY, ETC.
Summary, etc. Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice. The sixth edition of the Information Security Management Handbook addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking. US federal and state legislators continue to make certain that information security is a board-level conversation and the Information Security Management Handbook, Sixth Edition continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security-Management-Handbooks, Manuals
-- Data protection-Handbooks, Manuals
9 (RLIN) 9550
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Krause, Micki (ed.)
9 (RLIN) 9551
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference
Holdings
Price effective from Date last seen Permanent Location Not for loan Date acquired Source of classification or shelving scheme Koha item type Barcode Lost status Damaged status Shelving location Withdrawn status Current Location Full call number
2015-02-132015-02-13Central Library AIOU Islamabad 2008-09-12 Reference111286  Reference Central Library AIOU Islamabad005.8 INF

Copyright © 2023, All rights reserved,
Central Library, AIOU, Islamabad Pakistan.
Customized by Irfan Tahmoor Memon (Assistant Librarian)
Ph#: | 051-9571682, 051-9571695 Email| documentdelivery@aiou.edu.pk Web| ”Central Library”