//]]>

Preventing Good People from doing Bad Things (Record no. 28573)

000 -LEADER
fixed length control field 02872nam a22003855i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310153554.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111206s2011 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430239222
978-1-4302-3922-2
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF4999.2-6182
Classification number HD28-70
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 650
Edition number 23
264 #1 -
-- Berkeley, CA :
-- Apress :
-- Imprint: Apress,
-- 2011.
912 ## -
-- ZDB-2-CWD
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mutch, John.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Preventing Good People from doing Bad Things
Medium [electronic resource] :
Remainder of title Implementing Least Privilege /
Statement of responsibility, etc by John Mutch, Brian Anderson.
300 ## - PHYSICAL DESCRIPTION
Extent XII, 220 p.
Other physical details online resource.
520 ## - SUMMARY, ETC.
Summary, etc In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into account the weakest link in their implementation: human nature. Despite all other efforts, people can sway from what they should be doing. Preventing Good People from doing Bad Things drives that concept home to business executives, auditors, and IT professionals alike. Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft’s Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. The book also discusses the cost advantages of preventing good people from doing bad things. Each of the chapters emphasizes the need auditors, business executives, and IT professionals all have for least privilege, and discuss in detail the tensions and solutions it takes to implement this principle. Each chapter includes data from technology analysts including Forrester, Gartner, IDC, and Burton, along with analyst and industry expert quotations.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Economics.
Topical term or geographic name as entry element Economics/Management Science.
Topical term or geographic name as entry element Business/Management Science, general.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Anderson, Brian.
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781430239215
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4302-3922-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-03AUM Main Library2014-04-03 2014-04-03 E-Book   AUM Main Library650

Languages: 
English |
العربية