Information security policies, procedures, and standards : a practitioner's reference /
Highlighting key terminology, policy development concepts and methods, and suggested document structures, this practical guide includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. --
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Boca Raton, FL :
CRC Press,
2016.
|
Subjects: | |
Online Access: | CONNECT |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | in00006061452 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 160613s2016 flu ob 001 0 eng d | ||
005 | 20220713134512.4 | ||
010 | |a 2015040188 | ||
035 | |a 1WRLDSHRocn951629729 | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d OCLCO |d EBLCP |d IDB |d UAB |d K6U |d S4S |d VLB |d OTZ |d LIV |d CRCPR |d MERUC |d DEBBG |d OCLCA |d D6H |d VVB |d OCLCQ |d U3W |d AU@ |d COO |d WYU |d UWO |d TYFRS |d OCLCQ |d UMI |d VLY | ||
066 | |c Zsym | ||
019 | |a 1000428108 |a 1015204539 |a 1138950127 |a 1162338518 | ||
020 | |z 9781482245899 | ||
020 | |z 1482245892 | ||
020 | |a 9781482245912 |q (electronic bk.) | ||
020 | |a 1482245914 |q (electronic bk.) | ||
020 | |a 9781315372785 | ||
020 | |a 1315372789 | ||
020 | |a 9781315355474 | ||
020 | |a 1315355477 | ||
035 | |a (OCoLC)951629729 |z (OCoLC)1000428108 |z (OCoLC)1015204539 |z (OCoLC)1138950127 |z (OCoLC)1162338518 | ||
037 | |a CL0501000093 |b Safari Books Online | ||
050 | 4 | |a HF5548.37 |b .L3577 2016 | |
082 | 0 | 4 | |a 658.4/78 |2 23 |
049 | |a TXMM | ||
100 | 1 | |a Landoll, Douglas J., |e author. | |
245 | 1 | 0 | |a Information security policies, procedures, and standards : |b a practitioner's reference / |c Douglas J. Landoll. |
264 | 1 | |a Boca Raton, FL : |b CRC Press, |c 2016. | |
300 | |a 1 online resource (xiv, 230 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
520 | |a Highlighting key terminology, policy development concepts and methods, and suggested document structures, this practical guide includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. -- |c Edited summary from book. | ||
505 | 0 | |a Chapter 1. Introduction -- chapter 2. Information security policy basics -- chapter 3. Information security policy framework -- chapter 4. Information security policy details -- chapter 5. Information security procedures and standards -- chapter 6. Information security policy projects. | |
546 | |a English. | ||
590 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | ||
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Computer security. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |a Landoll, Douglas J. |t Information security policies, procedures, and standards. |d Boca Raton, FL : CRC Press, 2016 |z 9781482245899 |w (DLC) 2015040188 |w (OCoLC)927241566 |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781482245912/?ar |z CONNECT |3 O'Reilly |t 0 |
880 | 4 | |6 264-00/Zsym |c �20 | |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s 42252a7a-a030-472b-be18-8821395a6339 |i 7e562011-0d44-4536-a309-894edbedc003 |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e HF5548.37 .L3577 2016 |h Library of Congress classification |
856 | 4 | 0 | |3 O'Reilly |t 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781482245912/?ar |z CONNECT |