000 01781cam^a2200385^a^4500
001 UDM01000144202
003 UDM
005 20210531135017.0
008 121022s2011^^^^flua^^^^^b^^^^001^0^eng^^
020 _a1439827338
_q(alk. paper)
020 _a9781439827338
_q(alk. paper)
040 _aDLC
_cDLC
_dYDX
_dBTCTA
_dYDXCP
_dBWX
_dCDX
_dVLB
_dUN@
082 0 4 _a005.8
_bS775s 2011
100 1 _9282167
_aStackpole, Bill,
_eautor
245 1 0 _aSecurity strategy :
_bfrom requirements to reality /
_cBill Stackpole and Eric Oksendahl.
264 3 1 _aBoca Raton, FL :
_bCRC Press,
_cc2011.
300 _axxiii, 321 páginas :
_bilustraciones ;
_c26 cm.
336 _atexto
_btxt
_2rdacontent
337 _ano mediado
_bn
_2rdamedia
338 _avolumen
_bnc
_2rdacarrier
504 _aIncluye bibliografía.
505 0 _aStrategy : an introduction -- Getting the big picture -- Testing the consumer -- Strategic framework (imputs to strategic planning) -- Developing a strategic planning process -- Gates, geeks, and guards (security convergence) -- Tactics : an introduction -- Layer upon layer (defense in depth) -- Did you see that! (observation) -- Trust but verify (accountability) -- SDL and incident response -- Keep your enemies closer -- Hire a Hessian (outsourcing) -- Security awareness training.
650 1 4 _9101284
_aComputadores
_xSeguridad.
650 1 4 _9352638
_aTecnología de la información.
_xMedidas de seguridad.
700 1 _9254813
_aOksendahl, Eric.
_eautor
942 _2ddc
_cGEN
991 _aADM
_aOT12
_a000101339, Teviño Ayala, Ma. Eloisa.
991 _aC0
_bUN@
997 _aHZ
_b00
_c20140722
_lUDM01
_h1028
998 _aBATCH-UPD
_b00
_c20150424
_lUDM01
_h0040
999 _c131975
_d131975
900 _aDSÑ
900 _aAYN
900 _aTC