|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn773298336 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120119s2012 flua ob 001 0 eng d |
010 |
|
|
|a 2011043463
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d E7B
|d ALAUL
|d VLB
|d OCLCQ
|d OTZ
|d OCLCO
|d DEBSZ
|d OCLCQ
|d UMI
|d DEBBG
|d OCLCO
|d CRCPR
|d OCLCQ
|d OCLCF
|d UA@
|d RRP
|d COO
|d OCLCQ
|d OCLCO
|d Z5A
|d LIV
|d UAB
|d VT2
|d STF
|d OCLCQ
|d CEF
|d NLE
|d AU@
|d UKMGB
|d WYU
|d YDX
|d U3W
|d TYFRS
|d LEAUB
|d OCLCQ
|d UWO
|d UHL
|d LOA
|d K6U
|d LVT
|d N$T
|d OCLCQ
|d OCLCO
|d OCLCQ
|d TEFOD
|d OCLCO
|
015 |
|
|
|a GBB7A9242
|2 bnb
|
016 |
7 |
|
|a 018390436
|2 Uk
|
019 |
|
|
|a 781261746
|a 880372906
|a 1008951417
|a 1015208100
|a 1058327830
|a 1065686563
|a 1069720386
|a 1103279116
|a 1110599997
|a 1113813645
|a 1122501106
|a 1129364538
|a 1135515936
|a 1135829267
|a 1152704656
|a 1192334626
|a 1202536552
|
020 |
|
|
|a 9781439811658
|q (electronic bk.)
|
020 |
|
|
|a 1439811652
|q (electronic bk.)
|
020 |
|
|
|a 9780429131905
|q (e-book : PDF)
|
020 |
|
|
|a 0429131909
|
020 |
|
|
|a 9781466551282
|q (e-book)
|
020 |
|
|
|a 1466551283
|
020 |
|
|
|z 9781439811634
|
020 |
|
|
|z 1439811636
|
024 |
7 |
|
|a 10.1201/b11357
|2 doi
|
029 |
1 |
|
|a AU@
|b 000053282896
|
029 |
1 |
|
|a DEBBG
|b BV041135266
|
029 |
1 |
|
|a DEBBG
|b BV042032576
|
029 |
1 |
|
|a DEBSZ
|b 372696147
|
029 |
1 |
|
|a DEBSZ
|b 414180461
|
029 |
1 |
|
|a NZ1
|b 14243493
|
029 |
1 |
|
|a UKMGB
|b 018390436
|
035 |
|
|
|a (OCoLC)773298336
|z (OCoLC)781261746
|z (OCoLC)880372906
|z (OCoLC)1008951417
|z (OCoLC)1015208100
|z (OCoLC)1058327830
|z (OCoLC)1065686563
|z (OCoLC)1069720386
|z (OCoLC)1103279116
|z (OCoLC)1110599997
|z (OCoLC)1113813645
|z (OCoLC)1122501106
|z (OCoLC)1129364538
|z (OCoLC)1135515936
|z (OCoLC)1135829267
|z (OCoLC)1152704656
|z (OCoLC)1192334626
|z (OCoLC)1202536552
|
037 |
|
|
|a CL0500000429
|b Safari Books Online
|
037 |
|
|
|a 2D44C2A7-4502-4BCD-B529-EC4F398CCB34
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|b .F58 2012eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a BUS073000
|a COM032000
|a COM053000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Fitzgerald, Todd.
|
245 |
1 |
0 |
|a Information security governance simplified :
|b from the boardroom to the keyboard /
|c Todd Fitzgerald.
|
260 |
|
|
|a Boca Raton :
|b CRC Press,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xxviii, 381 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."--
|c Provided by publisher.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts.
|
506 |
0 |
|
|a Open Access
|5 EbpS
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information networks
|x Security measures.
|
650 |
|
0 |
|a Information resources management.
|
650 |
|
0 |
|a Business intelligence.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Gestion de l'information.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Commerce.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Business intelligence
|2 fast
|
650 |
|
7 |
|a Information networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Information resources management
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Fitzgerald, Todd.
|t Information security governance simplified.
|d Boca Raton : CRC Press, 2011
|z 9781439811634
|w (DLC) 2011043463
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439811658/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429131905
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15920182
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n CRC0KE10543PDF
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10517983
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 411946
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7060233
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11934338
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11934547
|
994 |
|
|
|a 92
|b IZTAP
|