Normal view MARC view ISBD view

Information security fundamentals / Thomas R. Peltier.

By: Peltier, Thomas R.
Material type: materialTypeLabelBookCopyright date: Boca Raton, [Florida] : CRC Press, Taylor & Francis Group, ©2014Edition: Second edition.Description: xxx, 408 pages : illustrations ; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781439810620 (paperback).Subject(s): Computer security | Data protection | BUSINESS & ECONOMICS / Commerce | COMPUTERS / Information Technology | COMPUTERS / Security / GeneralOnline resources: Cover image Summary: "Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Copy number Status Notes Date due Barcode Item holds
Books Books Main Library: Circulation Section
QA 76.9.A25 P45 2014 (Browse shelf) c.1 Available Requested by College of Computer and Information Sciences 16-026422
Books Books PUP Bataan Library
QA 76.9.A25 .P45 2014 (Browse shelf) c.1 Available Requested PUP Bataan BAT-00042
Books Books PUP Bataan Library
QA 76.9.A25 .P45 2014 (Browse shelf) c.2 Available Requested PUP Bataan BAT-00043
Total holds: 0

Includes bibliographical references and index.

"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"-- Provided by publisher.

There are no comments for this item.

Log in to your account to post a comment.

Ninoy Aquino Library and Learning Resource Center ©2016
A. Mabini Campus Anonas St., Sta. Mesa, Manila 1016
Telephone: +02 5335-1787 | Email: library@pup.edu.ph

Powered by Koha