Information security management principles: an ISEB certificate
How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming incre...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Swindon, U.K.
British Computer Society
2008
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781902505909/?ar |
Zusammenfassung: | How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming increasingly clear that technological solutions are not the only answer. Research conducted in 2007 suggests that at least 80% of data leakages are caused by staff rather than IT systems (source: Financial Times/Forrester Research, Nov-07). It is clear therefore that Information Security should be viewed as a management function rather than one of IT alone. Here, the authors outline the main management principles designed to help you secure your data, and raise awareness of the issues involved. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xix, 193 Seiten) illustrations |
ISBN: | 9781906124397 1906124396 9781902505909 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051694697 | ||
003 | DE-627-1 | ||
005 | 20241129125342.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2008 xx |||||o 00| ||eng c | ||
020 | |a 9781906124397 |c electronic bk. |9 978-1-906124-39-7 | ||
020 | |a 1906124396 |c electronic bk. |9 1-906124-39-6 | ||
020 | |a 9781902505909 |9 978-1-902505-90-9 | ||
035 | |a (DE-627-1)051694697 | ||
035 | |a (DE-599)KEP051694697 | ||
035 | |a (ORHE)9781902505909 | ||
035 | |a (DE-627-1)051694697 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8068/076 |2 22 | |
245 | 1 | 0 | |a Information security management principles |b an ISEB certificate |c Andy Taylor (editor) [and others] |
264 | 1 | |a Swindon, U.K. |b British Computer Society |c 2008 | |
300 | |a 1 Online-Ressource (xix, 193 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming increasingly clear that technological solutions are not the only answer. Research conducted in 2007 suggests that at least 80% of data leakages are caused by staff rather than IT systems (source: Financial Times/Forrester Research, Nov-07). It is clear therefore that Information Security should be viewed as a management function rather than one of IT alone. Here, the authors outline the main management principles designed to help you secure your data, and raise awareness of the issues involved. | ||
650 | 0 | |a Computer security |v Study guides |x Management |x Examinations | |
650 | 0 | |a Information technology |v Study guides |x Security measures | |
650 | 0 | |a Data protection |v Study guides |x Management |x Examinations | |
650 | 0 | |a Data protection | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Sécurité informatique ; Gestion ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures ; Guides de l'étudiant | |
650 | 4 | |a Protection de l'information (Informatique) ; Gestion ; Examens ; Guides de l'étudiant | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology ; Security measures | |
650 | 4 | |a Engineering & Applied Sciences | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Study guides | |
700 | 1 | |a Taylor, Andy |e HerausgeberIn |4 edt | |
710 | 2 | |a British Computer Society. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781902505909 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781902505909 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781902505909/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | 1 | |a ZDB-30-ORH |d 20241129 | |
912 | 1 | |a ZDB-30-ORH |d 20241129 | |
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051694697 |
---|---|
_version_ | 1821494922795024384 |
adam_text | |
any_adam_object | |
author2 | Taylor, Andy |
author2_role | edt |
author2_variant | a t at |
author_corporate | British Computer Society |
author_corporate_role | ctb |
author_facet | Taylor, Andy British Computer Society |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051694697 (DE-599)KEP051694697 (ORHE)9781902505909 |
dewey-full | 005.8068/076 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8068/076 |
dewey-search | 005.8068/076 |
dewey-sort | 15.8068 276 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03278cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-051694697</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241129125342.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781906124397</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-906124-39-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1906124396</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-906124-39-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781902505909</subfield><subfield code="9">978-1-902505-90-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051694697</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051694697</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781902505909</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051694697</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8068/076</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security management principles</subfield><subfield code="b">an ISEB certificate</subfield><subfield code="c">Andy Taylor (editor) [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Swindon, U.K.</subfield><subfield code="b">British Computer Society</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 193 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming increasingly clear that technological solutions are not the only answer. Research conducted in 2007 suggests that at least 80% of data leakages are caused by staff rather than IT systems (source: Financial Times/Forrester Research, Nov-07). It is clear therefore that Information Security should be viewed as a management function rather than one of IT alone. Here, the authors outline the main management principles designed to help you secure your data, and raise awareness of the issues involved.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Study guides</subfield><subfield code="x">Management</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="v">Study guides</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="v">Study guides</subfield><subfield code="x">Management</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique) ; Gestion ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering & Applied Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Study guides</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Taylor, Andy</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">British Computer Society.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781902505909</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781902505909</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781902505909/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1="1" ind2=" "><subfield code="a">ZDB-30-ORH</subfield><subfield code="d">20241129</subfield></datafield><datafield tag="912" ind1="1" ind2=" "><subfield code="a">ZDB-30-ORH</subfield><subfield code="d">20241129</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051694697 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:05Z |
institution | BVB |
isbn | 9781906124397 1906124396 9781902505909 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xix, 193 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | British Computer Society |
record_format | marc |
spelling | Information security management principles an ISEB certificate Andy Taylor (editor) [and others] Swindon, U.K. British Computer Society 2008 1 Online-Ressource (xix, 193 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index How safe is your information? Recent events show that commercial, personal and sensitive information is very hard to keep secure, and some estimates point to 2007 as being the worst year on record for data loss. As breaches in information security continue to make headline news, it is becoming increasingly clear that technological solutions are not the only answer. Research conducted in 2007 suggests that at least 80% of data leakages are caused by staff rather than IT systems (source: Financial Times/Forrester Research, Nov-07). It is clear therefore that Information Security should be viewed as a management function rather than one of IT alone. Here, the authors outline the main management principles designed to help you secure your data, and raise awareness of the issues involved. Computer security Study guides Management Examinations Information technology Study guides Security measures Data protection Study guides Management Examinations Data protection Protection de l'information (Informatique) Sécurité informatique ; Gestion ; Examens ; Guides de l'étudiant Technologie de l'information ; Sécurité ; Mesures ; Guides de l'étudiant Protection de l'information (Informatique) ; Gestion ; Examens ; Guides de l'étudiant COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information technology ; Security measures Engineering & Applied Sciences Computer Science Study guides Taylor, Andy HerausgeberIn edt British Computer Society. MitwirkendeR ctb 9781902505909 Erscheint auch als Druck-Ausgabe 9781902505909 |
spellingShingle | Information security management principles an ISEB certificate Computer security Study guides Management Examinations Information technology Study guides Security measures Data protection Study guides Management Examinations Data protection Protection de l'information (Informatique) Sécurité informatique ; Gestion ; Examens ; Guides de l'étudiant Technologie de l'information ; Sécurité ; Mesures ; Guides de l'étudiant Protection de l'information (Informatique) ; Gestion ; Examens ; Guides de l'étudiant COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information technology ; Security measures Engineering & Applied Sciences Computer Science Study guides |
title | Information security management principles an ISEB certificate |
title_auth | Information security management principles an ISEB certificate |
title_exact_search | Information security management principles an ISEB certificate |
title_full | Information security management principles an ISEB certificate Andy Taylor (editor) [and others] |
title_fullStr | Information security management principles an ISEB certificate Andy Taylor (editor) [and others] |
title_full_unstemmed | Information security management principles an ISEB certificate Andy Taylor (editor) [and others] |
title_short | Information security management principles |
title_sort | information security management principles an iseb certificate |
title_sub | an ISEB certificate |
topic | Computer security Study guides Management Examinations Information technology Study guides Security measures Data protection Study guides Management Examinations Data protection Protection de l'information (Informatique) Sécurité informatique ; Gestion ; Examens ; Guides de l'étudiant Technologie de l'information ; Sécurité ; Mesures ; Guides de l'étudiant Protection de l'information (Informatique) ; Gestion ; Examens ; Guides de l'étudiant COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information technology ; Security measures Engineering & Applied Sciences Computer Science Study guides |
topic_facet | Computer security Study guides Management Examinations Information technology Study guides Security measures Data protection Study guides Management Examinations Data protection Protection de l'information (Informatique) Sécurité informatique ; Gestion ; Examens ; Guides de l'étudiant Technologie de l'information ; Sécurité ; Mesures ; Guides de l'étudiant Protection de l'information (Informatique) ; Gestion ; Examens ; Guides de l'étudiant COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Information technology ; Security measures Engineering & Applied Sciences Computer Science Study guides |
work_keys_str_mv | AT taylorandy informationsecuritymanagementprinciplesanisebcertificate AT britishcomputersociety informationsecuritymanagementprinciplesanisebcertificate |