MARC details
000 -LEADER |
fixed length control field |
01613nam a22002177a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20211224131033.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
211224b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0849319587 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780849319587 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
PEI |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Peltier, Thomas R. |
245 ## - TITLE STATEMENT |
Title |
Information security policies and procedures : a practitioner's reference |
Statement of responsibility, etc. |
Thomas R Peltier |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton, FL : |
Name of publisher, distributor, etc. |
Auerbach Publications, |
Date of publication, distribution, etc. |
©2004. |
300 ## - PHYSICAL DESCRIPTION |
Page number |
xxiii, 384 pages : |
Other physical details |
illustrations, map ; |
Dimensions |
25 cm |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Why manage this process as a project? --<br/> |
-- |
Planning and preparation --<br/> |
-- |
Developing policies --<br/> |
-- |
Asset classification policy --<br/> |
-- |
Developing standards --<br/> |
-- |
Developing procedures --<br/> |
-- |
Creating a table of contents --<br/> |
-- |
Understanding how to sell policies, standards, and procedures. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts: an overview of security policies and procedures and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Gratis, Gifts |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
4685 |