| 000 | 01769cam a2200253 a 4500 | ||
|---|---|---|---|
| 008 | 120612s2011 nyu 001 0 eng | ||
| 010 | _a2011924924 | ||
| 020 | _a9781435481695 | ||
| 020 | _a1435481690 | ||
| 035 | _a(Sirsi) u8248 | ||
| 040 |
_aEG-CaNU _c EG-CaNU _d EG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 4 |
_a005.8 _2 22 |
| 100 | 1 |
_aShoemaker, Dan. _915125 |
|
| 245 | 1 | 0 |
_aCybersecurity : _b the essential body of knowledge / _c Dan Shoemaker, Wm. Arthur Conklin; [edited by] Steve Helba, Marah Bellegarde, Natalie Pashoukos. |
| 260 |
_aClifton Park, NY : _b Course Technology, Cengage Learning, _c 2011. |
||
| 300 |
_axxiv, 500 p. ; _c 25 cm. |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _a1. The Field of Cyber Security -- 2. The DHS EBK Initiative -- 3. Applying the EBK -- 4. The Executive role -- 5. The Functional role -- 6. The Corollary role -- 7. Data Security -- 8. Digital Forensics -- 9. Enterprise Continuity -- 10. Incident Management -- 11. IT Security Training and Awareness -- 12. IT Systems Operations and Maintenance -- 13. Network and Telecommunications Security -- 14. Personnel Security -- 15. Physical and Environmental Security -- 16. Procurement -- 17. Regulatory and Standards Compliance -- 18. Security Risk Management -- 19. Strategic Security Management -- 20. System and Application Security. | |
| 520 | _aCYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. | ||
| 650 | 0 |
_aData protection. _915126 |
|
| 650 | 0 |
_aComputer security. _915127 |
|
| 596 | _a1 | ||
| 999 |
_c7149 _d7149 |
||