Business continuity management : (Record no. 1881)

MARC details
000 -LEADER
fixed length control field 03190nam a2200301 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field MIUC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210426075639.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210423s2010 enka|||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 97879081369404
040 ## - CATALOGING SOURCE
Original cataloging agency MIUC
Language of cataloging eng
Transcribing agency MIUC
Description conventions rda
082 14 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 15
Classification number 658.15
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Landtsheer, Christophe de
Relator code aut
9 (RLIN) 1999
Relator term author
952 ## - Items
Itemnumber 2246
245 10 - TITLE STATEMENT
Title Business continuity management :
Remainder of title A practical guide to BS25999 and Information Security Management /
Statement of responsibility, etc. by Eugeen A. Matthys and Christophe J.J. de Landstsheer.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London :
Name of producer, publisher, distributor, manufacturer Retiarius Press,
Date of production, publication, distribution, manufacture, or copyright notice 2010.
300 ## - PHYSICAL DESCRIPTION
Extent 173 pages :
Other physical details illustrations colour ;
Dimensions 23 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes glossary.
500 ## - GENERAL NOTE
General note The reading of this book is supported by a complementary access to a BS25999 complaint Software-as-a-Service (SaaS) application.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Pt. 1. Business Continuity Management -- <br/>1. What is BCM? -- <br/>2. Why implement a formal BC process? -- <br/>3. How to operate a formal BC process? -- <br/>4. How to implement a BC process? -- <br/>5. The Benefits of a BCM software solution -- <br/>6. What does a good BCM software solution look like? -- <br/>Pt. 2.Information security -- <br/>1. Introduction -- <br/>2. Risk assessment -- <br/>3. Laws and regulations -- <br/>4. User authentication -- <br/>5. Security Policy awareness -- <br/>6. Patch Management -- <br/>7. Windows Desktop security -- <br/>8. Server security -- <br/>9. Firewall protection -- <br/>10. Web site protection -- <br/>11. Wireless Networks -- <br/>12. Intrusion testing -- <br/>13. Security through Obscurity -- <br/>14. Windows Operating System -- <br/>15. Electronic Mail -- <br/>16. About Spam -- <br/>17. Viruses -- <br/>18. Malware/Spyware/Adware -- <br/>19. Digital rights -- <br/>20. File sharing -- <br/>21. Data archives and backup -- <br/>22. Internet misuse -- <br/>23. Document security -- <br/>24. Data theft -- <br/>25. Encryption -- <br/>26. Working from home -- <br/>27. Hazards related to search engines -- <br/>28. Denial of Service -- <br/>29. Asset Management -- <br/>30. Internet shopping -- <br/>31. Intrusion & extrusion -- <br/>32. Virtual Servers -- <br/>33. Decision Makers -- <br/>34. Outsourcing !<br/>Glossary.<br/><br/><br/><br/>
520 ## - SUMMARY, ETC.
Summary, etc. Business Continuity and Information Security are increasingly important processes in the governance and management of organizations. The key emphasis of this book is on the practical application of the BC & IS principles, and covers these topics in two distinct sections.<br/><br/>Part I looks at the BS25999 - part 2 standard, and the Business Continuity management process it describes.<br/><br/>The second part pragmatically covers the principal Information Security topics in a non-technical manner.<br/><br/>This valuable resource includes many tips and tricks, clear dos and don'ts and best practices, within a structured framework that simplifies its reading for different profiles of stakeholders such as: board members, executives, plan managers, auditors, sopespersons, ICT staff, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 48
Topical term or geographic name entry element Business
General subdivision Management
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 505
Topical term or geographic name entry element International finance
General subdivision Management
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 1611
Topical term or geographic name entry element Information resources management
General subdivision Security
700 1# - ADDED ENTRY--PERSONAL NAME
Relator code aut
9 (RLIN) 5340
Personal name Matthys, Eugeen A.
Dates associated with a name author
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Marbella International University Centre Marbella International University Centre Library 23/04/2021 8 0.00   658.15 LAN bus 23/04/2021 0.00 23/04/2021 Books


© Marbella International University Centre, 2024. All rights reserved.

(Koha-ILS, Implemented and customized by MIUC Library in 2015)