Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Assessing information security [electronic resource] : strategies, tactics, logic and framework / A. Vladimirov, K. Gavrilenko, A. Michajlowski.

By: Vladimirov, Andrew A.
Contributor(s): Gavrilenko, Konstantin V | Mikhailovsky, Andrei A.
Material type: TextTextPublisher: Ely : IT Governance Pub., 2010Description: 1 online resource (405 p.) : ill.ISBN: 9781849280365 (electronic bk.); 1849280363 (electronic bk.).Subject(s): Computer security -- Auditing | Electronic books | Computer security | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Computer securityAdditional physical formats: Print version:: No titleDDC classification: 005.8 Online resources: EBSCOhost
Contents:
Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing, governance, policies and compliance -- Ch. 3. Security assessments classification -- Ch. 4. Advanced pre-assessment planning -- Ch. 5. Security audit strategies and tactics -- Ch. 6. Synthetic evaluation of risks -- Ch. 7. Presenting the outcome and follow-up acts -- Ch. 8. Reviewing security assessment failures and auditor management strategies.
Summary: This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Title from home page (viewed Jan. 4, 2011).

Includes bibliographical references.

Introduction -- Ch. 1. Information security auditing and strategy -- Ch. 2. Security auditing, governance, policies and compliance -- Ch. 3. Security assessments classification -- Ch. 4. Advanced pre-assessment planning -- Ch. 5. Security audit strategies and tactics -- Ch. 6. Synthetic evaluation of risks -- Ch. 7. Presenting the outcome and follow-up acts -- Ch. 8. Reviewing security assessment failures and auditor management strategies.

This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.

There are no comments for this item.

Log in to your account to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter