The Locator -- [(subject = "BUSINESS & ECONOMICS / Production & Operations Management")]

10 records matched your query       


Record 5 | Previous Record | Long Display | Next Record
03210aam a2200397 i 4500
001 C208A52A5BE811E38E3A7588DAD10320
003 SILO
005 20131203010051
008 130705s2014    flua          001 0 eng  
010    $a 2013025176
020    $a 1439841594 (hardback)
020    $a 9781439841594 (hardback)
035    $a (OCoLC)823552600
040    $a DLC $e rda $b eng $c DLC $d YDX $d UKMGB $d BTCTA $d OCLCO $d YDXCP $d SILO
042    $a pcc
050 00 $a QA76.9.D314 $b S34 2014
082 00 $a 003 $2 23
084    $a COM053000 $a COM032000 $a COM053000 $2 bisacsh
100 1  $a Scholz, James A.
245 10 $a Enterprise architecture and information assurance : $b developing a secure foundation / $c James A. Scholz.
264  1 $a Boca Raton, FL : $b CRC Press, $c [2014]
300    $a xxv, 240 pages : $b illustrations ; $c 25 cm
520    $a "Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes:Infrastructure security model componentsSystems security categorizationBusiness impact analysisRisk management and mitigationSecurity configuration managementContingency planningPhysical securityThe certification and accreditation processFacilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention"-- $c Provided by publisher.
500    $a Includes index.
504    $a Includes bibliographical references and index.
650  0 $a Database security.
650  0 $a Information storage and retrieval systems.
650  0 $a Management information systems.
650  0 $a Data protection.
650  0 $a System design.
650  7 $a BUSINESS & ECONOMICS / Production & Operations Management. $2 bisacsh
650  7 $a COMPUTERS / Information Technology. $2 bisacsh
650  7 $a COMPUTERS / Security / General. $2 bisacsh
941    $a 1
952    $l OVUX522 $d 20191211032025.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=C208A52A5BE811E38E3A7588DAD10320

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.