000 01939cam a2200313 i 4500
999 _c33089
_d33090
003 CO-SiCUC
005 20190322085128.0
008 160830s2016 a 001 0 eng d
020 _a978144221396
020 _a9781484221402
040 _erda
_aCO-SiCUC
_bspa
_cCO-SiCUC
041 _aeng
082 0 4 _a005.8
_bP791 2016
_222
100 1 _4aut
_aPompon, Raymond.
_eautor
_935280
245 1 0 _aIT security risk control management :
_ban audit preparation plan /
_cRaymond Pompon.
264 1 _aSeattle, Washington :
_bApress,
_cc2016
264 4 _c©2016.
300 _axxxi, 311 páginas :
_bfiguras ;
_c26 cm
336 _2rdacontent
_atexto
_btxt
337 _2rdamedia
_asin mediación
_bn
338 _2rdacarrier
_avolumen
_bnc
500 _aIncluye índice.
505 0 _aPart I: Getting a Handle on Things Chapter 1. Why Audit Chapter 2. Assume Breach. Chapter 3. Risk Analysis Assets and Impacts Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-Chapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement.
590 _aIngeniería de Sistemas
650 0 4 _aComputadores
_xSeguridad.
_935446
650 0 4 _aSeguridad de la información.
_935447
650 0 4 _aTecnologías de la información
_xAdministración.
_935448
942 _2ddc
_cBK