03238cam a22003375a 45000010009000000050017000090080041000260200018000670200015000850400033001000820021001331000025001542450131001792600048003103000035003585000027003935000024004205040031004445051389004755200542018646500074024066500055024806500053025356500098025886510010026866530020026967000023027169420008027399990017027479520136027641828882220160530104728.0140903t2015 nyua frbd 001 0 eng d a9780071821650 a0071821651 aDLCbengcDLCdDLCdEG-ScBUE00222a658.478bSCH1 aSchou, Corey.94009010aInformation assurance handbook :beffective computer security and risk management strategies /cCorey Schou, Steven Hernandez. aNew York :bMcGraw Hill Education,cc.2015. axxix, 450 p. :bill. ;c24 cm. aGlossary : p. 427-436. aIndex : p. 437-450. aBibliography : p. 405-419.8 aMachine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices. a"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"-- 0aComputer networksxSecurity measuresvHandbooks, manuals, etc.2BUEsh 0aComputer securityvHandbooks, manuals, etc.2BUEsh 0aData protectionvHandbooks, manuals, etc.2BUEsh 0aInformation storage and retrieval systemsxSecurity measuresvHandbooks, manuals, etc.2BUEsh 2BUEsh bCOMSCIcMay20161 aHernandez, Steven. 2ddc c21821d21793 00102ddc40708AlahramaMAINbMAINc1STd2016-05-30ePurchaseg510.00l0o658.478 SCHp000032603r2025-07-15 00:00:00v637.50yBB