Amazon cover image
Image from Amazon.com

Information security management principles / Andy Taylor ; David Alexander, Amanda Finch and David Sutton.

By: Contributor(s): Material type: TextTextPublisher: Swindon, UK : BCS, the Chartered Institute for IT, 2013Edition: Second editionDescription: xvi, 208 pages ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781780171753
Subject(s): DDC classification:
  • 658.478 TA.I 2013 23
LOC classification:
  • QA76.9.A25 T375 2013
Online resources:
Contents:
Information security principles -- information risk -- information security framework -- procedural and people security controls -- technical security controls -- software development and life cyle -- physical and environment security -- disaster recovery and business continuity management -- other technical aspects.
Summary: In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.
List(s) this item appears in: Engineering
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Computing 658.478 TA.I 2013 (Browse shelf(Opens below)) Not For Loan 190262

Includes bibliographical references (pages 189-190) and index.

Information security principles -- information risk -- information security framework -- procedural and people security controls -- technical security controls -- software development and life cyle -- physical and environment security -- disaster recovery and business continuity management -- other technical aspects.

In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

There are no comments on this title.

to post a comment.