語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Building an effective information se...
~
Bacik, Sandy.
Building an effective information security policy architecture[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Building an effective information security policy architecture/ Sandy Bacik.
作者:
Bacik, Sandy.
出版者:
Boca Raton : : CRC Press,, c2008.
面頁冊數:
1 online resource (xiv, 344 p.) : : ill.
附註:
"An Auerbach book."
標題:
Computer security.
標題:
Computer networks - Security measures.
ISBN:
9781420059069 (electronic bk.)
ISBN:
1420059068 (electronic bk.)
書目註:
Includes bibliographical references and index.
內容註:
Front cover; Dedication and Thanks; Contents; Preface; The Author; Chapter 1. Introduction; Chapter 2. The Enterprise; Chapter 3. What Is a Policy Architecture?; Chapter 4. Getting Ready to Start; Chapter 5. Writing the Documents; Chapter 6. Additional Key Policy Topics; Chapter 7. Putting It Together; Chapter 8. Crafting Communication for Maximum Effectiveness; Chapter 9. Security Monitoring and Metrics; Chapter 10. Continuing to Mold Your Style Through Experience; Appendix A; Appendix B; Appendix C; Appendix D; Appendix E; Appendix F; Appendix G; Appendix H; Appendix I; Appendix J.
摘要、提要註:
Demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. This book provides guidance for building, writing, and implementing policy architecture that is designed to fit with that culture. It demonstrates how to communicate that policy and provides advice on how to gain support.
電子資源:
http://www.crcnetbase.com/isbn/978-1-4200-5905-2
Building an effective information security policy architecture[electronic resource] /
Bacik, Sandy.
Building an effective information security policy architecture
[electronic resource] /Sandy Bacik. - Boca Raton :CRC Press,c2008. - 1 online resource (xiv, 344 p.) :ill.
"An Auerbach book."
Includes bibliographical references and index.
Front cover; Dedication and Thanks; Contents; Preface; The Author; Chapter 1. Introduction; Chapter 2. The Enterprise; Chapter 3. What Is a Policy Architecture?; Chapter 4. Getting Ready to Start; Chapter 5. Writing the Documents; Chapter 6. Additional Key Policy Topics; Chapter 7. Putting It Together; Chapter 8. Crafting Communication for Maximum Effectiveness; Chapter 9. Security Monitoring and Metrics; Chapter 10. Continuing to Mold Your Style Through Experience; Appendix A; Appendix B; Appendix C; Appendix D; Appendix E; Appendix F; Appendix G; Appendix H; Appendix I; Appendix J.
Demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. This book provides guidance for building, writing, and implementing policy architecture that is designed to fit with that culture. It demonstrates how to communicate that policy and provides advice on how to gain support.
ISBN: 9781420059069 (electronic bk.)Subjects--Topical Terms:
338952
Computer security.
Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: QA76.9.A25 / B335 2008eb
Dewey Class. No.: 005.8
Building an effective information security policy architecture[electronic resource] /
LDR
:01935cam a2200289Ia 4500
001
400719
003
OCoLC
005
20140108090637.0
006
m o d
007
cr cnu---unuuu
008
140127s2008 flua ob 001 0 eng d
020
$a
9781420059069 (electronic bk.)
020
$a
1420059068 (electronic bk.)
020
$z
9781420059052 (hbk.)
020
$z
142005905X (hbk.)
035
$a
ocn231660898
040
$a
N
$b
eng
$c
N
$d
YDXCP
$d
OCLCQ
$d
OSU
$d
CUS
$d
TXJ
$d
SHH
$d
E7B
$d
MHW
$d
EBLCP
$d
OCLCQ
$d
OCLCF
050
4
$a
QA76.9.A25
$b
B335 2008eb
082
0 4
$a
005.8
$2
22
100
1
$a
Bacik, Sandy.
$3
558600
245
1 0
$a
Building an effective information security policy architecture
$h
[electronic resource] /
$c
Sandy Bacik.
260
$a
Boca Raton :
$b
CRC Press,
$c
c2008.
300
$a
1 online resource (xiv, 344 p.) :
$b
ill.
500
$a
"An Auerbach book."
504
$a
Includes bibliographical references and index.
505
0
$a
Front cover; Dedication and Thanks; Contents; Preface; The Author; Chapter 1. Introduction; Chapter 2. The Enterprise; Chapter 3. What Is a Policy Architecture?; Chapter 4. Getting Ready to Start; Chapter 5. Writing the Documents; Chapter 6. Additional Key Policy Topics; Chapter 7. Putting It Together; Chapter 8. Crafting Communication for Maximum Effectiveness; Chapter 9. Security Monitoring and Metrics; Chapter 10. Continuing to Mold Your Style Through Experience; Appendix A; Appendix B; Appendix C; Appendix D; Appendix E; Appendix F; Appendix G; Appendix H; Appendix I; Appendix J.
520
$a
Demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. This book provides guidance for building, writing, and implementing policy architecture that is designed to fit with that culture. It demonstrates how to communicate that policy and provides advice on how to gain support.
588
$a
Description based on print version record.
650
0
$a
Computer security.
$3
338952
650
0
$a
Computer networks
$x
Security measures.
$3
341462
655
4
$a
Electronic books.
$2
local
$3
336502
856
4 0
$u
http://www.crcnetbase.com/isbn/978-1-4200-5905-2
筆 0 讀者評論
多媒體
多媒體檔案
http://www.crcnetbase.com/isbn/978-1-4200-5905-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入