000 03497nam a2200421 i 4500
005 20250930135408.0
008 140402s2014 flua b 001 0 eng
020 _a9781439841594 (hardback : alk. paper)
_cRM230.20
020 _a1439841594 (hardback : alk. paper)
039 9 _a201405201148
_brosli
_c201405141245
_dhamudah
_y04-02-2014
_zhamudah
040 _aDLC
_beng
_erda
_cDLC
_dYDX
_dUKMGB
_dBTCTA
_dOCLCO
_dYDXCP
_dCHVBK
_dOCLCF
_dUKM
090 _aQA76.9.D314S295
090 _aQA76.9.D314
_bS295
100 1 _aScholz, James A.
245 1 0 _aEnterprise architecture and information assurance :
_bdeveloping a secure foundation /
_cJames A. Scholz.
264 1 _aBoca Raton, Florida :
_bCRC Press/Taylor & Francis Group,
_c[2014].
300 _axxv, 240 pages :
_billustrations ;
_c25 cm.
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
500 _a'An Auerback Book'.
504 _aIncludes bibliographical references and index.
520 _a'Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes:Infrastructure security model componentsSystems security categorizationBusiness impact analysisRisk management and mitigationSecurity configuration managementContingency planningPhysical securityThe certification and accreditation processFacilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention'--
_cProvided by publisher.
650 0 _aDatabase security.
650 0 _aInformation storage and retrieval systems.
650 0 _aManagement information systems.
_960383
650 0 _aData protection.
650 0 _aSystem design.
856 4 2 _3Cover image
_uhttp://images.tandf.co.uk/common/jackets/websmall/978143984/9781439841594.jpg
907 _a.b15863384
_b2019-11-12
_c2019-11-12
942 _c01
_n0
_kQA76.9.D314S295
914 _avtls003555271
990 _ark4
991 _aFakulti Sains dan Teknologi Maklumat
998 _at
_b2014-02-04
_cm
_da
_feng
_gflu
_y0
_z.b15863384
999 _c566169
_d566169