Cargando…
Information protection playbook
The primary<i> </i>goal of the<i> Information Protection Playbook</i> is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that prote...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier Science
2013
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2123960 |
_version_ | 1780949542850527232 |
---|---|
author | Kane, Greg Koppel, Lorna |
author_facet | Kane, Greg Koppel, Lorna |
author_sort | Kane, Greg |
collection | CERN |
description | The primary<i> </i>goal of the<i> Information Protection Playbook</i> is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the <i>Information Protection Playbook</i>, security and information technology (IT) managers will learn how to |
id | cern-2123960 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Elsevier Science |
record_format | invenio |
spelling | cern-21239602021-04-21T19:51:03Zhttp://cds.cern.ch/record/2123960engKane, GregKoppel, LornaInformation protection playbookComputing and ComputersThe primary<i> </i>goal of the<i> Information Protection Playbook</i> is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the <i>Information Protection Playbook</i>, security and information technology (IT) managers will learn how toElsevier Scienceoai:cds.cern.ch:21239602013 |
spellingShingle | Computing and Computers Kane, Greg Koppel, Lorna Information protection playbook |
title | Information protection playbook |
title_full | Information protection playbook |
title_fullStr | Information protection playbook |
title_full_unstemmed | Information protection playbook |
title_short | Information protection playbook |
title_sort | information protection playbook |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2123960 |
work_keys_str_mv | AT kanegreg informationprotectionplaybook AT koppellorna informationprotectionplaybook |