Security planning & disaster recovery / Eric Maiwald, William Sieglein.

This volume provides information for creating and implementing a successful security and disaster recovery plan. Each chapter includes a hands-on security checklist with tasks to implement to ensure networks are safe.

Saved in:
Bibliographic Details
Online Access: Full Text (via EBSCO)
Main Author: Maiwald, Eric
Other Authors: Sieglein, William
Other title:Security planning and disaster recovery.
Format: eBook
Language:English
Published: New York : McGraw-Hill/Osborne, ©2002.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b7613456
006 m o d
007 cr |||||||||||
008 030306s2002 nyuaf o 001 0 eng d
005 20240520202749.1
019 |a 51487080  |a 53474072  |a 54070033  |a 276794966  |a 473547405  |a 551389647  |a 559480121  |a 606846545  |a 647266203  |a 658058148  |a 722188730  |a 728009926  |a 814327620  |a 961685385  |a 962675298  |a 984857222  |a 992108358  |a 1013793291  |a 1037516768  |a 1053322870 
020 |a 007222830X  |q (electronic bk.) 
020 |a 9780072228304  |q (electronic bk.) 
020 |a 1280302046 
020 |a 9781280302046 
020 |z 0072224630 
020 |z 9780072224634 
035 |a (OCoLC)ebs51805432 
035 |a (OCoLC)51805432  |z (OCoLC)51487080  |z (OCoLC)53474072  |z (OCoLC)54070033  |z (OCoLC)276794966  |z (OCoLC)473547405  |z (OCoLC)551389647  |z (OCoLC)559480121  |z (OCoLC)606846545  |z (OCoLC)647266203  |z (OCoLC)658058148  |z (OCoLC)722188730  |z (OCoLC)728009926  |z (OCoLC)814327620  |z (OCoLC)961685385  |z (OCoLC)962675298  |z (OCoLC)984857222  |z (OCoLC)992108358  |z (OCoLC)1013793291  |z (OCoLC)1037516768  |z (OCoLC)1053322870 
037 |a ebs79306 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d EXW  |d OCLCQ  |d TUU  |d OCLCQ  |d TNF  |d OCLCQ  |d ZCU  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d COO  |d B24X7  |d TEFOD  |d IDEBK  |d VVN  |d CAI  |d DKDLA  |d MERUC  |d CCO  |d E7B  |d OCLCE  |d OCLCO  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCO  |d SUR  |d PIFBR  |d OCLCQ  |d WY@  |d OCLCA  |d MNS  |d LUE  |d RCC  |d BRL  |d MUO  |d OCLCQ  |d INT  |d OCLCQ 
042 |a dlr 
049 |a GWRE 
050 4 |a QA76.9.A25  |b M315 2002eb 
100 1 |a Maiwald, Eric.  |0 http://id.loc.gov/authorities/names/no2001072946  |1 http://isni.org/isni/0000000109614496. 
245 1 0 |a Security planning & disaster recovery /  |c Eric Maiwald, William Sieglein. 
246 3 |a Security planning and disaster recovery. 
260 |a New York :  |b McGraw-Hill/Osborne,  |c ©2002. 
300 |a 1 online resource (xx, 299 pages, 8 pages of plates) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
500 |a Includes index. 
505 0 0 |t Guiding Principles in Plan Development --  |g The  |t Role of the Information Security Program --  |t Getting Off on the Right Foot --  |t Establishing the Role of Security --  |t Reporting Structure --  |t Mission Statement --  |t Long-Term Goals --  |t Short-Term Objectives --  |t Relationships --  |t Technical Relationships --  |t Business Relationships --  |t Checklist: Key Roles of the Program --  |t Laws and Regulations --  |t Working with the Legal and Compliance Departments --  |t Legal Background --  |t Computer Fraud and Abuse Act of 1986 --  |t Electronic Communications Privacy Act of 1986 --  |t Computer Security Act of 1987 --  |t National Information Infrastructure Protection Act of 1996 --  |t Gramm-Leach-Bliley Financial Services Modernization Act --  |t Health Insurance Portability and Accountability Act (HIPAA) --  |t Checklist: Key Points in Information Security Legal Issues --  |t Assessments --  |t Internal Audits --  |t External Audits --  |t Assessments --  |t Self-Assessments --  |t Vulnerability Assessments --  |t Penetration Tests --  |t Risk Assessments --  |t Checklist: Key Points in Assessments --  |t Plan Implementation --  |t Establishing Policies and Procedures --  |t Purpose of Policies --  |t Policies to Create --  |t Acceptable Use Policy --  |t Information Security Policy --  |t Dealing with Existing Documents --  |t Getting Buy-In --  |t Policy Review --  |t Checklist: Key Points in Establishing Policies and Procedures --  |t Implementing the Security Plan --  |t Where to Start --  |t Establish the Plan --  |t Risk Assessment --  |t Risk Reduction Plan --  |t Develop Policies --  |t Solution Deployment --  |t Training --  |t Audit and Reporting --  |t Do It All Over Again. 
520 |a This volume provides information for creating and implementing a successful security and disaster recovery plan. Each chapter includes a hands-on security checklist with tasks to implement to ensure networks are safe. 
588 0 |a Print version record. 
650 0 |a Computer security  |x Management.  |0 http://id.loc.gov/authorities/subjects/sh2009121243. 
650 0 |a Data protection.  |0 http://id.loc.gov/authorities/subjects/sh85035859. 
650 0 |a Emergency management.  |0 http://id.loc.gov/authorities/subjects/sh91000441. 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493. 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958. 
650 7 |a Emergency management.  |2 fast  |0 (OCoLC)fst00908500. 
700 1 |a Sieglein, William.  |0 http://id.loc.gov/authorities/names/no2002071943  |1 http://isni.org/isni/000000038375124X. 
776 0 8 |i Print version:  |a Maiwald, Eric.  |t Security planning & disaster recovery.  |d New York : McGraw-Hill/Osborne, ©2002  |z 0072224630  |w (DLC) 2002512069  |w (OCoLC)49640932. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&site=ehost-live&AN=79306  |z Full Text (via EBSCO) 
907 |a .b76134568  |b 08-18-22  |c 11-19-13 
907 |a .b76134568  |b 08-30-19  |c 11-19-13 
907 |a .b76134568  |b 01-03-19  |c 11-19-13 
907 |a .b76134568  |b 01-02-19  |c 11-19-13 
915 |a I 
944 |a MARS - RDA ENRICHED 
956 |a EBSCO ebook collection 
956 |b All EBSCO eBooks 
998 |a web  |b 01-02-19  |c b  |d b   |e -  |f eng  |g nyu  |h 0  |i 1 
999 f f |i c6f8e70a-d1a3-5120-b6cf-8746a6313b81  |s b206a72b-5c43-5470-a83d-f620bee586fe 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 M315 2002eb  |h Library of Congress classification  |i web  |n 1