IT Security Risk Control Management : An Audit Preparation Plan /

Detalles Bibliográficos
Autor principal: Pompon, Raymond. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: eBook
Lenguaje:English
Publicado: Berkeley, CA : Apress : Imprint: Apress, 2016.
Edición:1st ed. 2016.
Materias:
LEADER 02017nam a22003135i 4500
001 000285953
005 20210826110932.0
007 cr nn 008mamaa
008 160914s2016 xxu| s |||| 0|eng d
020 |a 9781484221402 
024 7 |a 10.1007/978-1-4842-2140-2  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
100 1 |a Pompon, Raymond.  |e author. 
245 1 0 |a IT Security Risk Control Management :  |b An Audit Preparation Plan /  |c by Raymond Pompon. 
250 |a 1st ed. 2016. 
260 # # |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2016. 
300 |a XXXI, 311 p. 33 illus., 11 illus. in color. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Part I: Getting a Handle on Things -- Chapter 1: Why Audit. Chapter 2: Assume Breach. Chapter 3: Risk Analysis: Assets and Impacts. Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-C hapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement. . 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 0 |a Application software. 
650 1 4 |a Security. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Information Systems Applications (incl. Internet). 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks