Menu
Home
Advanced Search
Directory of Libraries
About lib.ir
Contact Us
History
ورود / ثبت نام
عنوان
Information security cost management /
پدید آورنده
Ioana V. Bazavan, Ian Lim.
موضوع
Computer security-- Costs.,Computer security-- Economic aspects.,Computer security-- Management.,Bedrijfsleiding.,Computer security-- Costs.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Controlesystemen.,Risicoanalyse.,Strategische planning.
رده
QA76
.
9
.
A25
B395
2007eb
کتابخانه
Center and Library of Islamic Studies in European Languages
محل استقرار
استان:
Qom
ـ شهر:
Qom
تماس با کتابخانه :
32910706
-
025
INTERNATIONAL STANDARD BOOK NUMBER
(Number (ISBN
0849392756
(Number (ISBN
1420013831
(Number (ISBN
9780849392757
(Number (ISBN
9781420013832
NATIONAL BIBLIOGRAPHY NUMBER
Number
b739787
TITLE AND STATEMENT OF RESPONSIBILITY
Title Proper
Information security cost management /
General Material Designation
[Book]
First Statement of Responsibility
Ioana V. Bazavan, Ian Lim.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Boca Raton, Fla. :
Name of Publisher, Distributor, etc.
Auerbach,
Date of Publication, Distribution, etc.
©2007.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource (xix, 255 pages) :
Other Physical Details
illustrations
GENERAL NOTES
Text of Note
Includes index.
Text of Note
Title from title screen.
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Part Section 1: SECURITY STRATEGY -- THINKING PRACTICALLY -- chapter 1 Goals and Filters -- chapter 2 Building Your Strategy -- part Section 2: SECURITY ORGANIZATION DESIGN-COST-EFFECTIVE STAFFING -- chapter 3 The Right People for the Right Jobs -- chapter 4 Sourcing Solutions -- part Section 3. SECURITY MANAMGE-MENT-EFFECTIVELY ENFORCING YOUR STRATEGY -- chapter 5 Policies, Standards, and Procedures -- chapter 6 Training and Awareness -- chapter 7 Cost-Effective Audit Management -- chapter 8 Reporting Your Value -- part Section 4: SECURITY TECHNOLOGIES-ESTABLISHING A SOUND FOUNDATION -- chapter 9 Risk Assessment -- chapter 10 Security Design Review -- chapter 11 Exploit Protection -- part Section 5. SECURITY OPERATIONS-MAINTAINING SECURITY EFFICIENTLY -- chapter 12 Identity and Access Management -- chapter 13 Cost-Effective Incident Response.
0
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Ingram Content Group
Stock Number
TANDF_183592
OTHER EDITION IN ANOTHER MEDIUM
Title
Information security cost management.
International Standard Book Number
0849392756
TOPICAL NAME USED AS SUBJECT
Computer security-- Costs.
Computer security-- Economic aspects.
Computer security-- Management.
Bedrijfsleiding.
Computer security-- Costs.
Computer security-- Management.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.
Controlesystemen.
Risicoanalyse.
Strategische planning.
(SUBJECT CATEGORY (Provisional
COM-- 043050
COM-- 053000
COM-- 060040
DEWEY DECIMAL CLASSIFICATION
Number
005
.
8068
Edition
22
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA76
.
9
.
A25
Book number
B395
2007eb
PERSONAL NAME - PRIMARY RESPONSIBILITY
Bazavan, Ioana V.
PERSONAL NAME - ALTERNATIVE RESPONSIBILITY
Lim, Ian.
ORIGINATING SOURCE
Date of Transaction
20201204004546.0
Cataloguing Rules (Descriptive Conventions))
pn
ELECTRONIC LOCATION AND ACCESS
Electronic name
مطالعه متن کتاب
[Book]
Y
Proposal/Bug Report
×
Proposal/Bug Report
×
Warning!
Enter The Information Carefully
Error Report
Proposal