Best practices : security information management
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Valor |
---|---|---|---|
LDR | 00000nam a22000004b 4500 | ||
001 | MAP20080028428 | ||
003 | MAP | ||
005 | 20191202111856.0 | ||
008 | 080918s2007 usa|||| ||| ||eng d | ||
040 | $aMAP$bspa | ||
084 | $a86 | ||
100 | 1 | $0MAPA20080651589$aStamp, Paul | |
245 | 1 | 0 | $aBest practices$b : security information management$cby Paul Stamp with Jonathan Penn and Alissa Dill |
260 | $aCambridge$bForrester Research$c2007 | ||
490 | 1 | $aFor Security & risk professionals | |
520 | $aSecurity Information Management (SIM) solutions are no longer the sole domain of the largest organizations. More than one third of enterprises plan to deploy SIM tools by the middle of 2008, and those that have invested the time and effort in the tools already are reaping the benefits, streamlining existing processes, and implementing active monitoring controls where there were none previously. Successful organizations get the best benefit from their SIM implementations when they establish their immediate SIM needs clearly, but have a clear vision for what they want SIM to deliver in the future | ||
650 | 1 | $0MAPA20080622251$aSeguridad de la información | |
650 | 1 | $0MAPA20080569815$aOrganizaciones | |
650 | 1 | $0MAPA20080617059$aGestión de la información | |
650 | 1 | $0MAPA20080603731$aSeguridad informática | |
700 | 1 | $0MAPA20080648176$aPenn, Jonathan | |
700 | 1 | $0MAPA20080648183$aDill, Alissa | |
710 | 2 | $0MAPA20080436582$aForrester | |
830 | 3 | $0MAPA20080648190$aFor Security & risk professionals |