528 records matched your query
01933aam a2200277Ia 4500 001 C9A66422F5D411E7B33F7C0497128E48 003 SILO 005 20180110010212 008 160730t20162016caua 001 0 eng d 010 $a 2016952621 020 $a 1484221397 020 $a 9781484221396 035 $a (OCoLC)954429355 040 $a BTCTA $b eng $c BTCTA $d YPM $d UtOrBLW $d SILO 100 1 $a Pompon, Raymond. 245 10 $a IT security risk control management : $b an audit preparation plan / $c Raymond Pompon. 246 3 $a I T security risk control management 264 1 $a [Berkeley, Calif.] : $b Apress, $c [2016] 300 $a xxxi, 311 pages : $b illustrations ; $c 26 cm 500 $a Includes index. 505 0 $a Part I: Getting a Handle on Things -- Chapter 1: Why Audit. Chapter 2: Assume Breach. Chapter 3: Risk Analysis: Assets and Impacts. Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-Chapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement. 650 0 $a Information technology $x Management. $x Management. 650 0 $a Computer security. $0 http://id.loc.gov/authorities/subjects/sh90001862 941 $a 1 952 $l OVUX522 $d 20191213022505.0 956 $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=C9A66422F5D411E7B33F7C0497128E48Initiate Another SILO Locator Search