語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information assurance and risk manag...
~
Fowler, Bradley.
FindBook
Google Book
Amazon
博客來
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information assurance and risk management strategies/ by Bradley Fowler.
其他題名:
manage your information systems and tools in the cloud /
作者:
Fowler, Bradley.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xiii, 150 p. :ill., digital ;24 cm.
內容註:
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
Contained By:
Springer Nature eBook
標題:
Cloud computing - Security measures. -
電子資源:
https://doi.org/10.1007/978-1-4842-9742-1
ISBN:
9781484297421
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
Fowler, Bradley.
Information assurance and risk management strategies
manage your information systems and tools in the cloud /[electronic resource] :by Bradley Fowler. - Berkeley, CA :Apress :2023. - xiii, 150 p. :ill., digital ;24 cm.
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company's highly valuable information assets today! You will: Understand what information assurance is and how it relates to risk management strategies Assess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environments Develop and utilize information usage profiles and risk factor tables Understand the value of data encryption and usage of private and public key exchange for information assurance and security.
ISBN: 9781484297421
Standard No.: 10.1007/978-1-4842-9742-1doiSubjects--Topical Terms:
1375313
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .F68 2023
Dewey Class. No.: 004.6782
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
LDR
:03299nmm a2200349 a 4500
001
2334963
003
DE-He213
005
20230922193535.0
006
m d
007
cr nn 008maaau
008
240402s2023 cau s 0 eng d
020
$a
9781484297421
$q
(electronic bk.)
020
$a
9781484297414
$q
(paper)
024
7
$a
10.1007/978-1-4842-9742-1
$2
doi
035
$a
978-1-4842-9742-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.585
$b
.F68 2023
072
7
$a
UR
$2
bicssc
072
7
$a
GPQD
$2
bicssc
072
7
$a
BUS033070
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
GPQD
$2
thema
082
0 4
$a
004.6782
$2
23
090
$a
QA76.585
$b
.F785 2023
100
1
$a
Fowler, Bradley.
$3
3629778
245
1 0
$a
Information assurance and risk management strategies
$h
[electronic resource] :
$b
manage your information systems and tools in the cloud /
$c
by Bradley Fowler.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiii, 150 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
520
$a
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company's highly valuable information assets today! You will: Understand what information assurance is and how it relates to risk management strategies Assess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environments Develop and utilize information usage profiles and risk factor tables Understand the value of data encryption and usage of private and public key exchange for information assurance and security.
650
0
$a
Cloud computing
$x
Security measures.
$3
1375313
650
0
$a
Risk management.
$3
540477
650
1 4
$a
IT Risk Management.
$3
3538812
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Business Information Systems.
$3
892640
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9742-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9461168
電子資源
11.線上閱覽_V
電子書
EB QA76.585 .F68 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入