Cargando…

Information protection playbook

The primary<i> </i>goal of the<i> Information Protection Playbook</i> is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that prote...

Descripción completa

Detalles Bibliográficos
Autores principales: Kane, Greg, Koppel, Lorna
Lenguaje:eng
Publicado: Elsevier Science 2013
Materias:
Acceso en línea:http://cds.cern.ch/record/2123960
_version_ 1780949542850527232
author Kane, Greg
Koppel, Lorna
author_facet Kane, Greg
Koppel, Lorna
author_sort Kane, Greg
collection CERN
description The primary<i> </i>goal of the<i> Information Protection Playbook</i> is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the <i>Information Protection Playbook</i>, security and information technology (IT) managers will learn how to
id cern-2123960
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
publisher Elsevier Science
record_format invenio
spelling cern-21239602021-04-21T19:51:03Zhttp://cds.cern.ch/record/2123960engKane, GregKoppel, LornaInformation protection playbookComputing and ComputersThe primary<i> </i>goal of the<i> Information Protection Playbook</i> is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the <i>Information Protection Playbook</i>, security and information technology (IT) managers will learn how toElsevier Scienceoai:cds.cern.ch:21239602013
spellingShingle Computing and Computers
Kane, Greg
Koppel, Lorna
Information protection playbook
title Information protection playbook
title_full Information protection playbook
title_fullStr Information protection playbook
title_full_unstemmed Information protection playbook
title_short Information protection playbook
title_sort information protection playbook
topic Computing and Computers
url http://cds.cern.ch/record/2123960
work_keys_str_mv AT kanegreg informationprotectionplaybook
AT koppellorna informationprotectionplaybook