Business continuity management : (Record no. 1881)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03190nam a2200301 i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | MIUC |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20210426075639.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210423s2010 enka|||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 97879081369404 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | MIUC |
| Language of cataloging | eng |
| Transcribing agency | MIUC |
| Description conventions | rda |
| 082 14 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Edition number | 15 |
| Classification number | 658.15 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Landtsheer, Christophe de |
| Relator code | aut |
| 9 (RLIN) | 1999 |
| Relator term | author |
| 952 ## - Items | |
| Itemnumber | 2246 |
| 245 10 - TITLE STATEMENT | |
| Title | Business continuity management : |
| Remainder of title | A practical guide to BS25999 and Information Security Management / |
| Statement of responsibility, etc. | by Eugeen A. Matthys and Christophe J.J. de Landstsheer. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Place of production, publication, distribution, manufacture | London : |
| Name of producer, publisher, distributor, manufacturer | Retiarius Press, |
| Date of production, publication, distribution, manufacture, or copyright notice | 2010. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 173 pages : |
| Other physical details | illustrations colour ; |
| Dimensions | 23 cm. |
| 336 ## - CONTENT TYPE | |
| Source | rdacontent |
| Content type term | text |
| 337 ## - MEDIA TYPE | |
| Source | rdamedia |
| Media type term | unmediated |
| 338 ## - CARRIER TYPE | |
| Source | rdacarrier |
| Carrier type term | volume |
| 500 ## - GENERAL NOTE | |
| General note | Includes glossary. |
| 500 ## - GENERAL NOTE | |
| General note | The reading of this book is supported by a complementary access to a BS25999 complaint Software-as-a-Service (SaaS) application. |
| 505 00 - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Pt. 1. Business Continuity Management -- <br/>1. What is BCM? -- <br/>2. Why implement a formal BC process? -- <br/>3. How to operate a formal BC process? -- <br/>4. How to implement a BC process? -- <br/>5. The Benefits of a BCM software solution -- <br/>6. What does a good BCM software solution look like? -- <br/>Pt. 2.Information security -- <br/>1. Introduction -- <br/>2. Risk assessment -- <br/>3. Laws and regulations -- <br/>4. User authentication -- <br/>5. Security Policy awareness -- <br/>6. Patch Management -- <br/>7. Windows Desktop security -- <br/>8. Server security -- <br/>9. Firewall protection -- <br/>10. Web site protection -- <br/>11. Wireless Networks -- <br/>12. Intrusion testing -- <br/>13. Security through Obscurity -- <br/>14. Windows Operating System -- <br/>15. Electronic Mail -- <br/>16. About Spam -- <br/>17. Viruses -- <br/>18. Malware/Spyware/Adware -- <br/>19. Digital rights -- <br/>20. File sharing -- <br/>21. Data archives and backup -- <br/>22. Internet misuse -- <br/>23. Document security -- <br/>24. Data theft -- <br/>25. Encryption -- <br/>26. Working from home -- <br/>27. Hazards related to search engines -- <br/>28. Denial of Service -- <br/>29. Asset Management -- <br/>30. Internet shopping -- <br/>31. Intrusion & extrusion -- <br/>32. Virtual Servers -- <br/>33. Decision Makers -- <br/>34. Outsourcing !<br/>Glossary.<br/><br/><br/><br/> |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Business Continuity and Information Security are increasingly important processes in the governance and management of organizations. The key emphasis of this book is on the practical application of the BC & IS principles, and covers these topics in two distinct sections.<br/><br/>Part I looks at the BS25999 - part 2 standard, and the Business Continuity management process it describes.<br/><br/>The second part pragmatically covers the principal Information Security topics in a non-technical manner.<br/><br/>This valuable resource includes many tips and tricks, clear dos and don'ts and best practices, within a structured framework that simplifies its reading for different profiles of stakeholders such as: board members, executives, plan managers, auditors, sopespersons, ICT staff, etc. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 48 |
| Topical term or geographic name entry element | Business |
| General subdivision | Management |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 505 |
| Topical term or geographic name entry element | International finance |
| General subdivision | Management |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 1611 |
| Topical term or geographic name entry element | Information resources management |
| General subdivision | Security |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Relator code | aut |
| 9 (RLIN) | 5340 |
| Personal name | Matthys, Eugeen A. |
| Dates associated with a name | author |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Date last seen | Cost, replacement price | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Marbella International University Centre | Marbella International University Centre | Library | 23/04/2021 | 8 | 0.00 | 658.15 LAN bus | 23/04/2021 | 0.00 | 23/04/2021 | Books |
