| 000 | 03497nam a2200421 i 4500 | ||
|---|---|---|---|
| 005 | 20250930135408.0 | ||
| 008 | 140402s2014 flua b 001 0 eng | ||
| 020 |
_a9781439841594 (hardback : alk. paper) _cRM230.20 |
||
| 020 | _a1439841594 (hardback : alk. paper) | ||
| 039 | 9 |
_a201405201148 _brosli _c201405141245 _dhamudah _y04-02-2014 _zhamudah |
|
| 040 |
_aDLC _beng _erda _cDLC _dYDX _dUKMGB _dBTCTA _dOCLCO _dYDXCP _dCHVBK _dOCLCF _dUKM |
||
| 090 | _aQA76.9.D314S295 | ||
| 090 |
_aQA76.9.D314 _bS295 |
||
| 100 | 1 | _aScholz, James A. | |
| 245 | 1 | 0 |
_aEnterprise architecture and information assurance : _bdeveloping a secure foundation / _cJames A. Scholz. |
| 264 | 1 |
_aBoca Raton, Florida : _bCRC Press/Taylor & Francis Group, _c[2014]. |
|
| 300 |
_axxv, 240 pages : _billustrations ; _c25 cm. |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 500 | _a'An Auerback Book'. | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a'Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes:Infrastructure security model componentsSystems security categorizationBusiness impact analysisRisk management and mitigationSecurity configuration managementContingency planningPhysical securityThe certification and accreditation processFacilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention'-- _cProvided by publisher. |
||
| 650 | 0 | _aDatabase security. | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 0 |
_aManagement information systems. _960383 |
|
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aSystem design. | |
| 856 | 4 | 2 |
_3Cover image _uhttp://images.tandf.co.uk/common/jackets/websmall/978143984/9781439841594.jpg |
| 907 |
_a.b15863384 _b2019-11-12 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kQA76.9.D314S295 |
||
| 914 | _avtls003555271 | ||
| 990 | _ark4 | ||
| 991 | _aFakulti Sains dan Teknologi Maklumat | ||
| 998 |
_at _b2014-02-04 _cm _da _feng _gflu _y0 _z.b15863384 |
||
| 999 |
_c566169 _d566169 |
||