Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Information security management : concepts and practice / Bel G. Raggad.

By: Material type: TextTextPublication details: Boca Raton, FL : CRC Press/Taylor & Francis, c2010.Description: xxxv, 832 p. : ill. ; 25 cmISBN:
  • 9781420078541
  • 1420078542
Subject(s): DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 R34 2010
Contents:
Introduction to Information security management -- Introduction to management concepts -- The Information security life cycle -- Security plan -- Security policy -- Business continuity planning -- Security risk management -- Continual Security: Integrated fault event analysis and Response framework (IFEAR) --Active security assessment -- System availability -- Nominal security enhancement design based on ISO/IEC 27002 -- Technical security enhancement based on ISO/IEC 27001 -- Security solutions -- The common criteria -- Security review through security audit -- Privacy rights, information technology and HIPAA -- The sarbanes -oxley act and IT compliance -- Cyberterrorism and homeland security
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Barcode
Books Books Zetech Library - Ruiru Campus General Stacks Non-fiction QA76.9.A25 .R34 2010 (Browse shelf(Opens below)) C 1 Available Z013234

"An Auerbach book."

Includes bibliographical references and index.

Introduction to Information security management -- Introduction to management concepts -- The Information security life cycle -- Security plan -- Security policy -- Business continuity planning -- Security risk management -- Continual Security: Integrated fault event analysis and Response framework (IFEAR) --Active security assessment -- System availability -- Nominal security enhancement design based on ISO/IEC 27002 -- Technical security enhancement based on ISO/IEC 27001 -- Security solutions -- The common criteria -- Security review through security audit -- Privacy rights, information technology and HIPAA -- The sarbanes -oxley act and IT compliance -- Cyberterrorism and homeland security

There are no comments on this title.

to post a comment.