Security planning & disaster recovery / Eric Maiwald, William Sieglein.
This volume provides information for creating and implementing a successful security and disaster recovery plan. Each chapter includes a hands-on security checklist with tasks to implement to ensure networks are safe.
Saved in:
Online Access: |
Full Text (via EBSCO) |
---|---|
Main Author: | |
Other Authors: | |
Other title: | Security planning and disaster recovery. |
Format: | eBook |
Language: | English |
Published: |
New York :
McGraw-Hill/Osborne,
©2002.
|
Subjects: |
MARC
LEADER | 00000cam a2200000xa 4500 | ||
---|---|---|---|
001 | b7613456 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 030306s2002 nyuaf o 001 0 eng d | ||
005 | 20240520202749.1 | ||
019 | |a 51487080 |a 53474072 |a 54070033 |a 276794966 |a 473547405 |a 551389647 |a 559480121 |a 606846545 |a 647266203 |a 658058148 |a 722188730 |a 728009926 |a 814327620 |a 961685385 |a 962675298 |a 984857222 |a 992108358 |a 1013793291 |a 1037516768 |a 1053322870 | ||
020 | |a 007222830X |q (electronic bk.) | ||
020 | |a 9780072228304 |q (electronic bk.) | ||
020 | |a 1280302046 | ||
020 | |a 9781280302046 | ||
020 | |z 0072224630 | ||
020 | |z 9780072224634 | ||
035 | |a (OCoLC)ebs51805432 | ||
035 | |a (OCoLC)51805432 |z (OCoLC)51487080 |z (OCoLC)53474072 |z (OCoLC)54070033 |z (OCoLC)276794966 |z (OCoLC)473547405 |z (OCoLC)551389647 |z (OCoLC)559480121 |z (OCoLC)606846545 |z (OCoLC)647266203 |z (OCoLC)658058148 |z (OCoLC)722188730 |z (OCoLC)728009926 |z (OCoLC)814327620 |z (OCoLC)961685385 |z (OCoLC)962675298 |z (OCoLC)984857222 |z (OCoLC)992108358 |z (OCoLC)1013793291 |z (OCoLC)1037516768 |z (OCoLC)1053322870 | ||
037 | |a ebs79306 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d EXW |d OCLCQ |d TUU |d OCLCQ |d TNF |d OCLCQ |d ZCU |d OCLCO |d OCLCF |d OCLCQ |d OCLCO |d OCLCQ |d COO |d B24X7 |d TEFOD |d IDEBK |d VVN |d CAI |d DKDLA |d MERUC |d CCO |d E7B |d OCLCE |d OCLCO |d OCLCQ |d TEFOD |d OCLCQ |d OCLCO |d SUR |d PIFBR |d OCLCQ |d WY@ |d OCLCA |d MNS |d LUE |d RCC |d BRL |d MUO |d OCLCQ |d INT |d OCLCQ | ||
042 | |a dlr | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 |b M315 2002eb | |
100 | 1 | |a Maiwald, Eric. |0 http://id.loc.gov/authorities/names/no2001072946 |1 http://isni.org/isni/0000000109614496. | |
245 | 1 | 0 | |a Security planning & disaster recovery / |c Eric Maiwald, William Sieglein. |
246 | 3 | |a Security planning and disaster recovery. | |
260 | |a New York : |b McGraw-Hill/Osborne, |c ©2002. | ||
300 | |a 1 online resource (xx, 299 pages, 8 pages of plates) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
500 | |a Includes index. | ||
505 | 0 | 0 | |t Guiding Principles in Plan Development -- |g The |t Role of the Information Security Program -- |t Getting Off on the Right Foot -- |t Establishing the Role of Security -- |t Reporting Structure -- |t Mission Statement -- |t Long-Term Goals -- |t Short-Term Objectives -- |t Relationships -- |t Technical Relationships -- |t Business Relationships -- |t Checklist: Key Roles of the Program -- |t Laws and Regulations -- |t Working with the Legal and Compliance Departments -- |t Legal Background -- |t Computer Fraud and Abuse Act of 1986 -- |t Electronic Communications Privacy Act of 1986 -- |t Computer Security Act of 1987 -- |t National Information Infrastructure Protection Act of 1996 -- |t Gramm-Leach-Bliley Financial Services Modernization Act -- |t Health Insurance Portability and Accountability Act (HIPAA) -- |t Checklist: Key Points in Information Security Legal Issues -- |t Assessments -- |t Internal Audits -- |t External Audits -- |t Assessments -- |t Self-Assessments -- |t Vulnerability Assessments -- |t Penetration Tests -- |t Risk Assessments -- |t Checklist: Key Points in Assessments -- |t Plan Implementation -- |t Establishing Policies and Procedures -- |t Purpose of Policies -- |t Policies to Create -- |t Acceptable Use Policy -- |t Information Security Policy -- |t Dealing with Existing Documents -- |t Getting Buy-In -- |t Policy Review -- |t Checklist: Key Points in Establishing Policies and Procedures -- |t Implementing the Security Plan -- |t Where to Start -- |t Establish the Plan -- |t Risk Assessment -- |t Risk Reduction Plan -- |t Develop Policies -- |t Solution Deployment -- |t Training -- |t Audit and Reporting -- |t Do It All Over Again. |
520 | |a This volume provides information for creating and implementing a successful security and disaster recovery plan. Each chapter includes a hands-on security checklist with tasks to implement to ensure networks are safe. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security |x Management. |0 http://id.loc.gov/authorities/subjects/sh2009121243. | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859. | |
650 | 0 | |a Emergency management. |0 http://id.loc.gov/authorities/subjects/sh91000441. | |
650 | 7 | |a Computer security |x Management. |2 fast |0 (OCoLC)fst00872493. | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958. | |
650 | 7 | |a Emergency management. |2 fast |0 (OCoLC)fst00908500. | |
700 | 1 | |a Sieglein, William. |0 http://id.loc.gov/authorities/names/no2002071943 |1 http://isni.org/isni/000000038375124X. | |
776 | 0 | 8 | |i Print version: |a Maiwald, Eric. |t Security planning & disaster recovery. |d New York : McGraw-Hill/Osborne, ©2002 |z 0072224630 |w (DLC) 2002512069 |w (OCoLC)49640932. |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&site=ehost-live&AN=79306 |z Full Text (via EBSCO) |
907 | |a .b76134568 |b 08-18-22 |c 11-19-13 | ||
907 | |a .b76134568 |b 08-30-19 |c 11-19-13 | ||
907 | |a .b76134568 |b 01-03-19 |c 11-19-13 | ||
907 | |a .b76134568 |b 01-02-19 |c 11-19-13 | ||
915 | |a I | ||
944 | |a MARS - RDA ENRICHED | ||
956 | |a EBSCO ebook collection | ||
956 | |b All EBSCO eBooks | ||
998 | |a web |b 01-02-19 |c b |d b |e - |f eng |g nyu |h 0 |i 1 | ||
999 | f | f | |i c6f8e70a-d1a3-5120-b6cf-8746a6313b81 |s b206a72b-5c43-5470-a83d-f620bee586fe |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 M315 2002eb |h Library of Congress classification |i web |n 1 |