| 000 | 03190nam a2200301 i 4500 | ||
|---|---|---|---|
| 003 | MIUC | ||
| 005 | 20210426075639.0 | ||
| 008 | 210423s2010 enka|||| |||| 00| 0 eng d | ||
| 020 | _a97879081369404 | ||
| 040 |
_aMIUC _beng _cMIUC _erda |
||
| 082 | 1 | 4 |
_215 _a658.15 |
| 100 | 1 |
_aLandtsheer, Christophe de _4aut _91999 _eauthor |
|
| 245 | 1 | 0 |
_aBusiness continuity management : _bA practical guide to BS25999 and Information Security Management / _cby Eugeen A. Matthys and Christophe J.J. de Landstsheer. |
| 264 | 1 |
_aLondon : _bRetiarius Press, _c2010. |
|
| 300 |
_a173 pages : _billustrations colour ; _c23 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 500 | _aIncludes glossary. | ||
| 500 | _aThe reading of this book is supported by a complementary access to a BS25999 complaint Software-as-a-Service (SaaS) application. | ||
| 505 | 0 | 0 | _aPt. 1. Business Continuity Management -- 1. What is BCM? -- 2. Why implement a formal BC process? -- 3. How to operate a formal BC process? -- 4. How to implement a BC process? -- 5. The Benefits of a BCM software solution -- 6. What does a good BCM software solution look like? -- Pt. 2.Information security -- 1. Introduction -- 2. Risk assessment -- 3. Laws and regulations -- 4. User authentication -- 5. Security Policy awareness -- 6. Patch Management -- 7. Windows Desktop security -- 8. Server security -- 9. Firewall protection -- 10. Web site protection -- 11. Wireless Networks -- 12. Intrusion testing -- 13. Security through Obscurity -- 14. Windows Operating System -- 15. Electronic Mail -- 16. About Spam -- 17. Viruses -- 18. Malware/Spyware/Adware -- 19. Digital rights -- 20. File sharing -- 21. Data archives and backup -- 22. Internet misuse -- 23. Document security -- 24. Data theft -- 25. Encryption -- 26. Working from home -- 27. Hazards related to search engines -- 28. Denial of Service -- 29. Asset Management -- 30. Internet shopping -- 31. Intrusion & extrusion -- 32. Virtual Servers -- 33. Decision Makers -- 34. Outsourcing ! Glossary. |
| 520 | _aBusiness Continuity and Information Security are increasingly important processes in the governance and management of organizations. The key emphasis of this book is on the practical application of the BC & IS principles, and covers these topics in two distinct sections. Part I looks at the BS25999 - part 2 standard, and the Business Continuity management process it describes. The second part pragmatically covers the principal Information Security topics in a non-technical manner. This valuable resource includes many tips and tricks, clear dos and don'ts and best practices, within a structured framework that simplifies its reading for different profiles of stakeholders such as: board members, executives, plan managers, auditors, sopespersons, ICT staff, etc. | ||
| 650 | 0 |
_948 _aBusiness _xManagement |
|
| 650 | 0 |
_9505 _aInternational finance _xManagement |
|
| 650 | 0 |
_91611 _aInformation resources management _xSecurity |
|
| 700 | 1 |
_4aut _95340 _aMatthys, Eugeen A. _dauthor |
|
| 942 |
_2ddc _cBK |
||