Once more unto the breach : managing information security in an uncertain world /

In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book exami...

Full description

Saved in:
Bibliographic Details
Main Author: Simmons, Andrea C.
Format: eBook
Language:English
Published: [Ely, Cambridgeshire], U.K. : IT Governance Pub., 2012.
Subjects:
Online Access:CONNECT
CONNECT
CONNECT
CONNECT
LEADER 06365cam a2200661Ma 4500
001 in00006046269
006 m o d
007 cr zn|||||||||
008 130221s2012 enka ob 000 0 eng d
005 20220714134343.5
035 |a 1WRLDSHRocn833573774 
040 |a CtWfDGI  |b eng  |e pn  |c STF  |d OCLCO  |d B24X7  |d MHW  |d EBLCP  |d N$T  |d MEAUC  |d UMI  |d DEBSZ  |d JSTOR  |d OCLCO  |d YDXCP  |d OCLCQ  |d OCLCO  |d COO  |d OCLCQ  |d OCLCO  |d AGLDB  |d DGU  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d OCLCF  |d CEF  |d OCLCQ  |d LVT  |d STF  |d UAB  |d UKAHL  |d VT2  |d OCLCQ  |d UX1  |d OCLCO 
019 |a 853454336  |a 859144312  |a 1175626752 
020 |a 9781849283892  |q (electronic bk.) 
020 |a 1849283893  |q (electronic bk.) 
020 |z 9781849283885 
020 |z 1849283885 
020 |z 9781849283908 
020 |z 1849283907 
035 |a (OCoLC)833573774  |z (OCoLC)853454336  |z (OCoLC)859144312  |z (OCoLC)1175626752 
037 |a CL0500000301  |b Safari Books Online 
037 |a 22573/ctt4k5c0r  |b JSTOR 
050 4 |a HF5548.37  |b .S56 2012eb 
082 0 4 |a 658.4/78  |2 23 
049 |a TXMM 
100 1 |a Simmons, Andrea C. 
245 1 0 |a Once more unto the breach :  |b managing information security in an uncertain world /  |c Andrea C. Simmons. 
260 |a [Ely, Cambridgeshire], U.K. :  |b IT Governance Pub.,  |c 2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
520 |a In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project. 
505 0 |a Preface; About the Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project ... ; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); How many users are there?; How many assets require protection in your organisation?; Of the assets identified, how many servers are there?; What about information assets?; What version (or versions) of anti-virus is (are) running and how often is it (are they) being updated?; How many systems administrators are there? 
505 8 |a How often are systems updated?How many exceptions (deviations) to policy are there?; When were access controls last reviewed?; What level of information security awareness is there across the organisation?; How is incident management addressed?; What about team and company communications?; What about other projects going on in your organisation at the same time?; Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Business as usual; Information ownership; Physical security; Incident. 
505 8 |a Password managementLaptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction; Information security policy; Managing corporate anti-virus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud Computing; Project management; Security awareness theme; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Security awareness theme. 
505 8 |a Chapter summaryChapter 5: December: Oh, for the sake of yet another proposal ... ; Security improvement programme; Fax management; Image build again; Physical security findings; Physical security solution suggestions; Other security tasks for this month; Environmental concerns; Information security awareness briefings; 'Kit' movement; Laptop users ... again!; Security awareness theme; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management. 
505 8 |a Penetration testing resultsBack to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Job descriptions; Users' understanding; People management; Security awareness theme; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy; UK Data Protection Act 1998, seventh principle; Other security tasks for this month; User administration; Inventory management; Security awareness theme; Chapter summary. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
590 |a Books at JSTOR Evidence Based Acquisitions 
650 0 |a Business enterprises  |x Information technology  |x Security measures. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Simmons, Andrea C.  |t Once more unto the breach.  |d Ely, Cambridgeshire : IT Governance Pub., 2012  |z 9781849283885  |w (OCoLC)809312693 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781849283908/?ar  |z CONNECT  |3 O'Reilly  |t 0 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctt5hh3xx  |z CONNECT  |3 JSTOR 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s fc858852-4271-431c-8922-d9ac795e9f96  |i c4c3e04f-b99d-4408-9a14-37eff1de42cb  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e HF5548.37 .S56 2012eb  |h Library of Congress classification 
856 4 0 |3 JSTOR  |t 0  |u https://ezproxy.mtsu.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctt5hh3xx  |z CONNECT 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781849283908/?ar  |z CONNECT