000 | 01939cam a2200313 i 4500 | ||
---|---|---|---|
999 |
_c33089 _d33090 |
||
003 | CO-SiCUC | ||
005 | 20190322085128.0 | ||
008 | 160830s2016 a 001 0 eng d | ||
020 | _a978144221396 | ||
020 | _a9781484221402 | ||
040 |
_erda _aCO-SiCUC _bspa _cCO-SiCUC |
||
041 | _aeng | ||
082 | 0 | 4 |
_a005.8 _bP791 2016 _222 |
100 | 1 |
_4aut _aPompon, Raymond. _eautor _935280 |
|
245 | 1 | 0 |
_aIT security risk control management : _ban audit preparation plan / _cRaymond Pompon. |
264 | 1 |
_aSeattle, Washington : _bApress, _cc2016 |
|
264 | 4 | _c©2016. | |
300 |
_axxxi, 311 páginas : _bfiguras ; _c26 cm |
||
336 |
_2rdacontent _atexto _btxt |
||
337 |
_2rdamedia _asin mediación _bn |
||
338 |
_2rdacarrier _avolumen _bnc |
||
500 | _aIncluye índice. | ||
505 | 0 | _aPart I: Getting a Handle on Things Chapter 1. Why Audit Chapter 2. Assume Breach. Chapter 3. Risk Analysis Assets and Impacts Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-Chapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement. | |
590 | _aIngeniería de Sistemas | ||
650 | 0 | 4 |
_aComputadores _xSeguridad. _935446 |
650 | 0 | 4 |
_aSeguridad de la información. _935447 |
650 | 0 | 4 |
_aTecnologías de la información _xAdministración. _935448 |
942 |
_2ddc _cBK |