Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Information assurance architecture / Keith D. WIllett.
Author
Willett, Keith D.
[Browse]
Format
Book
Language
English
Published/Created
Boca Raton : CRC Press, c2008.
Description
1 online resource (620 p.)
Details
Subject(s)
Business enterprises
—
Communication systems
—
Management
[Browse]
Computer networks
—
Security measures
[Browse]
Computer security
[Browse]
Data protection
[Browse]
Information resources management
[Browse]
Information technology
—
Management
[Browse]
Summary note
Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information Assurance Architecture, Keith D. Willett draws on his over 25 years of technical, security, and business experience to provide a framework for organizations to align information assurance with the enterprise and their overall mission.The Tools to Protect Your Secrets from Exposure
Notes
"An Auerbach book."
Bibliographic references
Includes bibliographical references (p. 555-557) and index.
Language note
English
Contents
Front cover; Dedication; Contents; Author's Note; Preface; Acknowledgments; SECTION: IA2; Chapter 1. Foundational Concepts for IA2; Chapter 2. The IA2 Framework; Chapter 3. The IA2 Process; Chapter 4. IA Quantification; SECTION II: Applied IA2; Chapter 5. Organizational Views of IA; Chapter 6. IA Business Drivers; Chapter 7. IA Technical Drivers; Chapter 8. IA2: Context of IA Services; Chapter 9. IA2; Context of IA Mechanisms; Chapter 10. Aligning IA2 and EA Standards; SECTION III: IA2 Enterprise; Chapter 11. The Framework Perspective; Chapter 12. The Frameworks; Chapter 13. IA Justification
Chapter 14. Future of IA and IA2Appendix A: IA2 Process Template; Appendix B: Templates of IA2 F Views; Appendix C: IA Quantification Process Template; Appendix D: Security Management Program Framework; Appendix E: Security Management Program Template Outline; Appendix F: NI ST Document Applicability Template; Appendix G: IA Standards Best Practices References; Appendix H: Root Cause Analysis Template; Appendix I: Problem Assertion Document Template; Appendix J: Privacy Management Program Outline; Appendix K: E-Insurance; Appendix L: Reading List; Glossary; References; List of Figures
List of TablesIndex; Back cover
ISBN
0-429-11904-6
1-281-51564-7
9786611515645
0-8493-8068-5
OCLC
437224193
502443128
Doi
10.1201/9780849380686
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information