Information Security Management Handbook, 6th ed.最新文献

筛选
英文 中文
Computing FacilityPhysical Security 计算设施物理安全
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch100
A. Brusewitz
{"title":"Computing FacilityPhysical Security","authors":"A. Brusewitz","doi":"10.1201/9781439833032.ch100","DOIUrl":"https://doi.org/10.1201/9781439833032.ch100","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Security Policy Life Cycle 安全策略生命周期
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch33
P. Howard
{"title":"The Security Policy Life Cycle","authors":"P. Howard","doi":"10.1201/9781439833032.ch33","DOIUrl":"https://doi.org/10.1201/9781439833032.ch33","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ethics and the Internet 道德与互联网
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch56
Micki Krause
{"title":"Ethics and the Internet","authors":"Micki Krause","doi":"10.1201/9781439833032.ch56","DOIUrl":"https://doi.org/10.1201/9781439833032.ch56","url":null,"abstract":"This document provides a minimum set of guidelines for Network Etiquette (Netiquette) which organizations may take and adapt for their own use. As such, it is deliberately written in a bulleted format to make adaptation easier and to make any particular item easy (or easier) to find. It also functions as a minimum set of guidelines for individuals, both users and administrators. This memo is the product of the Responsible Use of the Network (RUN) Working Group of the IETF.","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127361111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stack-Based Buffer Overflows 基于堆栈的缓冲区溢出
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch171
Jonathan S. Held
{"title":"Stack-Based Buffer Overflows","authors":"Jonathan S. Held","doi":"10.1201/9781439833032.ch171","DOIUrl":"https://doi.org/10.1201/9781439833032.ch171","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122354319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy for Data Warehouses 数据仓库的安全性和隐私性
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch182
David Bonewell, Karen Gibbs, Adriaan Veldhuisen
{"title":"Security and Privacy for Data Warehouses","authors":"David Bonewell, Karen Gibbs, Adriaan Veldhuisen","doi":"10.1201/9781439833032.ch182","DOIUrl":"https://doi.org/10.1201/9781439833032.ch182","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"48 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129256776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Maintenance Processes for Business Continuity Plans 业务连续性计划的楼宇维修程序
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch114
K. Doughty
{"title":"Building Maintenance Processes for Business Continuity Plans","authors":"K. Doughty","doi":"10.1201/9781439833032.ch114","DOIUrl":"https://doi.org/10.1201/9781439833032.ch114","url":null,"abstract":"Management has a fiduciary duty to maintain and continue to support and fund the organization’s risk management program—including business continuity. In the event of a disaster, the likelihood of a costeffective recovery in a timely manner is compromised unless there has been continual executive management support for maintaining the plan in a state of readiness. Business continuity/disaster recovery surveys in the United States have revealed that:","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physical Security 物理安全
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch104
Jaymes Williams
{"title":"Physical Security","authors":"Jaymes Williams","doi":"10.1201/9781439833032.ch104","DOIUrl":"https://doi.org/10.1201/9781439833032.ch104","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114559350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Methods of Auditing Applications 审计应用程序的方法
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch191
D. C. Rice, Graham Bucholz
{"title":"Methods of Auditing Applications","authors":"D. C. Rice, Graham Bucholz","doi":"10.1201/9781439833032.ch191","DOIUrl":"https://doi.org/10.1201/9781439833032.ch191","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Router Security 网络路由器安全
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch139
Steven F. Blanding
{"title":"Network Router Security","authors":"Steven F. Blanding","doi":"10.1201/9781439833032.ch139","DOIUrl":"https://doi.org/10.1201/9781439833032.ch139","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Top Management Support Essential for Effective Information Security 最高管理者的支持对有效的信息安全至关重要
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch5
Kenneth J. Knapp, T. Marshall
{"title":"Top Management Support Essential for Effective Information Security","authors":"Kenneth J. Knapp, T. Marshall","doi":"10.1201/9781439833032.ch5","DOIUrl":"https://doi.org/10.1201/9781439833032.ch5","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123398661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信