000 02230cam a2200433 i 4500
001 700790
003 UIASF
005 20240117113144.0
008 220428t20172017maua||||rb||| 001 0 eng d
010 _a2016946590
020 _a9780128020425
020 _a0128020423
035 _a447500
040 _aRIU
_bspa
_erda
_cRIU
_dUIASF
050 4 _aHF 5548.37
_bA537.2017
100 1 _aAndress, Jason
_eautor
_9189567
245 1 0 _aBuilding a practical information security program /
_cJason Andress, CISSP, ISSAP, CISM, GPEN, Mark Leary, CISSP, CISM, CGIET, PMP.
264 1 _aCambridge, MA :
_bSyngress, is an imprint of Elsevier,
_c2017,
264 4 _c©2017.
300 _axi, 191 páginas :
_bilustraciones ;
_c24 cm
336 _atexto
_btxt
_2rdacontent
337 _asin mediación
_bn
_2rdamedia
338 _avolumen
_bnc
_2rdacarrier
504 _aIncluye referencias bibliográficas e índice.
541 _aPlanes Manresa
505 0 _aChapter 0. Why we need security programs -- chapter 1. Develop an information security strategy -- chapter 2. Integrate security into the organization -- chapter 3. Establish a security organization -- chapter 4. Why information security policies? -- chapter 5. Manage the risks -- chapter 6. Protect the data -- chapter 7. Manage the security of third parties and vendors -- chapter 8. Conduct security awareness and training -- chapter 9. Security compliance management and auditing -- chapter 10. Information security program metrics.
520 _aDemonstrates how to resolve immediate tactical needs, transform security needs into strategic goals, and put programs into operation with full lifecycle management.
650 0 _aComputer networks
_xSecurity measures
650 4 _aRedes de computadoras
_xMedidas de seguridad
650 0 _aInformation storage and retrieval systems
_xSecurity measures
650 4 _aSistemas de almacenamiento y recuperación de información
_xMedidas de seguridad
650 0 _aComputer security
650 4 _aSeguridad informática
_9162591
700 1 _aLeary, Mark
_eautor
942 _2lcc
_cNEWBFXC1
980 _6128864
_aLAURA CAROLINA CARROUCHE SILVA
_8128854
_gVICTOR DE LA MORA MEDINA
999 _c700790
_d700790