𝔖 Scriptorium
✦   LIBER   ✦

📁

Managing Information System Security

✍ Scribed by Gurpreet Dhillon (auth.)


Publisher
Macmillan Education UK
Year
1997
Tongue
English
Leaves
219
Series
Information Systems Series
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Front Matter....Pages i-viii
Orientation....Pages 1-7
The context of information system security....Pages 8-28
A framework for interpreting the management of IS security....Pages 29-39
The case of managing IS and security in a Hospital Trust....Pages 40-91
The case of managing IS and security in a Local Council....Pages 92-136
Principles for managing information system security....Pages 137-172
Conclusion....Pages 173-181
Back Matter....Pages 182-210

✦ Subjects


Information Systems and Communication Service; Library Science; Data Encryption; Systems and Data Security


📜 SIMILAR VOLUMES


Information technology -- Security techn
✍ ISO 📂 Scientific 📅 2013 🌐 English

Настоящий международный стандарт устанавливает требования к созданию, внедрению, техническому обслуживанию и непрерывному усовершенствованию системы обеспечения информационной безопасности организации в контексте её хозяйственной деятельности в условиях существующих рисков. Стандарт определяет также

Advances in Information Security Managem
✍ Les Labuschagne (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gu 📂 Library 📅 2001 🏛 Springer US 🌐 English

<p>The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses

Managing Information Systems Security an
✍ Assoc. Prof. Denis Trček Ph.D. (auth.) 📂 Library 📅 2006 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security a