Once more unto the breach : managing information security in an uncertain world /
In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book exami...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
[Ely, Cambridgeshire], U.K. :
IT Governance Pub.,
2012.
|
Subjects: | |
Online Access: | CONNECT CONNECT CONNECT CONNECT |
LEADER | 06365cam a2200661Ma 4500 | ||
---|---|---|---|
001 | in00006046269 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 130221s2012 enka ob 000 0 eng d | ||
005 | 20220714134343.5 | ||
035 | |a 1WRLDSHRocn833573774 | ||
040 | |a CtWfDGI |b eng |e pn |c STF |d OCLCO |d B24X7 |d MHW |d EBLCP |d N$T |d MEAUC |d UMI |d DEBSZ |d JSTOR |d OCLCO |d YDXCP |d OCLCQ |d OCLCO |d COO |d OCLCQ |d OCLCO |d AGLDB |d DGU |d LIV |d MERUC |d OCLCQ |d IOG |d OCLCA |d OCLCF |d CEF |d OCLCQ |d LVT |d STF |d UAB |d UKAHL |d VT2 |d OCLCQ |d UX1 |d OCLCO | ||
019 | |a 853454336 |a 859144312 |a 1175626752 | ||
020 | |a 9781849283892 |q (electronic bk.) | ||
020 | |a 1849283893 |q (electronic bk.) | ||
020 | |z 9781849283885 | ||
020 | |z 1849283885 | ||
020 | |z 9781849283908 | ||
020 | |z 1849283907 | ||
035 | |a (OCoLC)833573774 |z (OCoLC)853454336 |z (OCoLC)859144312 |z (OCoLC)1175626752 | ||
037 | |a CL0500000301 |b Safari Books Online | ||
037 | |a 22573/ctt4k5c0r |b JSTOR | ||
050 | 4 | |a HF5548.37 |b .S56 2012eb | |
082 | 0 | 4 | |a 658.4/78 |2 23 |
049 | |a TXMM | ||
100 | 1 | |a Simmons, Andrea C. | |
245 | 1 | 0 | |a Once more unto the breach : |b managing information security in an uncertain world / |c Andrea C. Simmons. |
260 | |a [Ely, Cambridgeshire], U.K. : |b IT Governance Pub., |c 2012. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
520 | |a In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project. | ||
505 | 0 | |a Preface; About the Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project ... ; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); How many users are there?; How many assets require protection in your organisation?; Of the assets identified, how many servers are there?; What about information assets?; What version (or versions) of anti-virus is (are) running and how often is it (are they) being updated?; How many systems administrators are there? | |
505 | 8 | |a How often are systems updated?How many exceptions (deviations) to policy are there?; When were access controls last reviewed?; What level of information security awareness is there across the organisation?; How is incident management addressed?; What about team and company communications?; What about other projects going on in your organisation at the same time?; Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Business as usual; Information ownership; Physical security; Incident. | |
505 | 8 | |a Password managementLaptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction; Information security policy; Managing corporate anti-virus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud Computing; Project management; Security awareness theme; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Security awareness theme. | |
505 | 8 | |a Chapter summaryChapter 5: December: Oh, for the sake of yet another proposal ... ; Security improvement programme; Fax management; Image build again; Physical security findings; Physical security solution suggestions; Other security tasks for this month; Environmental concerns; Information security awareness briefings; 'Kit' movement; Laptop users ... again!; Security awareness theme; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management. | |
505 | 8 | |a Penetration testing resultsBack to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Job descriptions; Users' understanding; People management; Security awareness theme; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy; UK Data Protection Act 1998, seventh principle; Other security tasks for this month; User administration; Inventory management; Security awareness theme; Chapter summary. | |
590 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | ||
590 | |a Books at JSTOR Evidence Based Acquisitions | ||
650 | 0 | |a Business enterprises |x Information technology |x Security measures. | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Data protection. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |a Simmons, Andrea C. |t Once more unto the breach. |d Ely, Cambridgeshire : IT Governance Pub., 2012 |z 9781849283885 |w (OCoLC)809312693 |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781849283908/?ar |z CONNECT |3 O'Reilly |t 0 |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctt5hh3xx |z CONNECT |3 JSTOR |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s fc858852-4271-431c-8922-d9ac795e9f96 |i c4c3e04f-b99d-4408-9a14-37eff1de42cb |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 1 |e HF5548.37 .S56 2012eb |h Library of Congress classification |
856 | 4 | 0 | |3 JSTOR |t 0 |u https://ezproxy.mtsu.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctt5hh3xx |z CONNECT |
856 | 4 | 0 | |3 O'Reilly |t 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781849283908/?ar |z CONNECT |