000 03190nam a2200301 i 4500
003 MIUC
005 20210426075639.0
008 210423s2010 enka|||| |||| 00| 0 eng d
020 _a97879081369404
040 _aMIUC
_beng
_cMIUC
_erda
082 1 4 _215
_a658.15
100 1 _aLandtsheer, Christophe de
_4aut
_91999
_eauthor
245 1 0 _aBusiness continuity management :
_bA practical guide to BS25999 and Information Security Management /
_cby Eugeen A. Matthys and Christophe J.J. de Landstsheer.
264 1 _aLondon :
_bRetiarius Press,
_c2010.
300 _a173 pages :
_billustrations colour ;
_c23 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
500 _aIncludes glossary.
500 _aThe reading of this book is supported by a complementary access to a BS25999 complaint Software-as-a-Service (SaaS) application.
505 0 0 _aPt. 1. Business Continuity Management -- 1. What is BCM? -- 2. Why implement a formal BC process? -- 3. How to operate a formal BC process? -- 4. How to implement a BC process? -- 5. The Benefits of a BCM software solution -- 6. What does a good BCM software solution look like? -- Pt. 2.Information security -- 1. Introduction -- 2. Risk assessment -- 3. Laws and regulations -- 4. User authentication -- 5. Security Policy awareness -- 6. Patch Management -- 7. Windows Desktop security -- 8. Server security -- 9. Firewall protection -- 10. Web site protection -- 11. Wireless Networks -- 12. Intrusion testing -- 13. Security through Obscurity -- 14. Windows Operating System -- 15. Electronic Mail -- 16. About Spam -- 17. Viruses -- 18. Malware/Spyware/Adware -- 19. Digital rights -- 20. File sharing -- 21. Data archives and backup -- 22. Internet misuse -- 23. Document security -- 24. Data theft -- 25. Encryption -- 26. Working from home -- 27. Hazards related to search engines -- 28. Denial of Service -- 29. Asset Management -- 30. Internet shopping -- 31. Intrusion & extrusion -- 32. Virtual Servers -- 33. Decision Makers -- 34. Outsourcing ! Glossary.
520 _aBusiness Continuity and Information Security are increasingly important processes in the governance and management of organizations. The key emphasis of this book is on the practical application of the BC & IS principles, and covers these topics in two distinct sections. Part I looks at the BS25999 - part 2 standard, and the Business Continuity management process it describes. The second part pragmatically covers the principal Information Security topics in a non-technical manner. This valuable resource includes many tips and tricks, clear dos and don'ts and best practices, within a structured framework that simplifies its reading for different profiles of stakeholders such as: board members, executives, plan managers, auditors, sopespersons, ICT staff, etc.
650 0 _948
_aBusiness
_xManagement
650 0 _9505
_aInternational finance
_xManagement
650 0 _91611
_aInformation resources management
_xSecurity
700 1 _4aut
_95340
_aMatthys, Eugeen A.
_dauthor
942 _2ddc
_cBK