|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-90-481-8882-6 |
003 |
DE-He213 |
005 |
20220113171635.0 |
007 |
cr nn 008mamaa |
008 |
100623s2010 ne | s |||| 0|eng d |
020 |
|
|
|a 9789048188826
|9 978-90-481-8882-6
|
024 |
7 |
|
|a 10.1007/978-90-481-8882-6
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a Partida, Alberto.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a IT Security Management
|h [electronic resource] :
|b IT Securiteers - Setting up an IT Security Function /
|c by Alberto Partida, Diego Andina.
|
250 |
|
|
|a 1st ed. 2010.
|
264 |
|
1 |
|a Dordrecht :
|b Springer Netherlands :
|b Imprint: Springer,
|c 2010.
|
300 |
|
|
|a XXXV, 247 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1119 ;
|v 61
|
505 |
0 |
|
|a Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team-Individual Contract -- What to Do: The IT Security Roadmap -- How to Do It: Organise the Work in "Baby Steps" -- Team Dynamics: Building a "Human System" -- Viral Marketing -- Management Support: An Indispensable Ingredient -- Social Networking for IT Security Professionals -- Present, Future and Beauty of IT Security.
|
520 |
|
|
|a IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers". They will add value to the business, improving the information security stance of organisations.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Andina, Diego.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789048188833
|
776 |
0 |
8 |
|i Printed edition:
|z 9789048188819
|
776 |
0 |
8 |
|i Printed edition:
|z 9789400732629
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1119 ;
|v 61
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-90-481-8882-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|