Local cover image
Local cover image
Image from Google Jackets

Business continuity management : A practical guide to BS25999 and Information Security Management / by Eugeen A. Matthys and Christophe J.J. de Landstsheer.

By: Contributor(s): Material type: TextPublisher: London : Retiarius Press, 2010Description: 173 pages : illustrations colour ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 97879081369404
Subject(s): DDC classification:
  • 15 658.15
Contents:
Summary: Business Continuity and Information Security are increasingly important processes in the governance and management of organizations. The key emphasis of this book is on the practical application of the BC & IS principles, and covers these topics in two distinct sections. Part I looks at the BS25999 - part 2 standard, and the Business Continuity management process it describes. The second part pragmatically covers the principal Information Security topics in a non-technical manner. This valuable resource includes many tips and tricks, clear dos and don'ts and best practices, within a structured framework that simplifies its reading for different profiles of stakeholders such as: board members, executives, plan managers, auditors, sopespersons, ICT staff, etc.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Books Marbella International University Centre Library 658.15 LAN bus (Browse shelf(Opens below)) Available 12217

Includes glossary.

The reading of this book is supported by a complementary access to a BS25999 complaint Software-as-a-Service (SaaS) application.

Pt. 1. Business Continuity Management --
1. What is BCM? --
2. Why implement a formal BC process? --
3. How to operate a formal BC process? --
4. How to implement a BC process? --
5. The Benefits of a BCM software solution --
6. What does a good BCM software solution look like? --
Pt. 2.Information security --
1. Introduction --
2. Risk assessment --
3. Laws and regulations --
4. User authentication --
5. Security Policy awareness --
6. Patch Management --
7. Windows Desktop security --
8. Server security --
9. Firewall protection --
10. Web site protection --
11. Wireless Networks --
12. Intrusion testing --
13. Security through Obscurity --
14. Windows Operating System --
15. Electronic Mail --
16. About Spam --
17. Viruses --
18. Malware/Spyware/Adware --
19. Digital rights --
20. File sharing --
21. Data archives and backup --
22. Internet misuse --
23. Document security --
24. Data theft --
25. Encryption --
26. Working from home --
27. Hazards related to search engines --
28. Denial of Service --
29. Asset Management --
30. Internet shopping --
31. Intrusion & extrusion --
32. Virtual Servers --
33. Decision Makers --
34. Outsourcing !
Glossary.



Business Continuity and Information Security are increasingly important processes in the governance and management of organizations. The key emphasis of this book is on the practical application of the BC & IS principles, and covers these topics in two distinct sections.

Part I looks at the BS25999 - part 2 standard, and the Business Continuity management process it describes.

The second part pragmatically covers the principal Information Security topics in a non-technical manner.

This valuable resource includes many tips and tricks, clear dos and don'ts and best practices, within a structured framework that simplifies its reading for different profiles of stakeholders such as: board members, executives, plan managers, auditors, sopespersons, ICT staff, etc.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image


© Marbella International University Centre, 2024. All rights reserved.

(Koha-ILS, Implemented and customized by MIUC Library in 2015)