Cargando…

Information security governance simplified : from the boardroom to the keyboard /

"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Fitzgerald, Todd
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn773298336
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 120119s2012 flua ob 001 0 eng d
010 |a  2011043463 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d E7B  |d ALAUL  |d VLB  |d OCLCQ  |d OTZ  |d OCLCO  |d DEBSZ  |d OCLCQ  |d UMI  |d DEBBG  |d OCLCO  |d CRCPR  |d OCLCQ  |d OCLCF  |d UA@  |d RRP  |d COO  |d OCLCQ  |d OCLCO  |d Z5A  |d LIV  |d UAB  |d VT2  |d STF  |d OCLCQ  |d CEF  |d NLE  |d AU@  |d UKMGB  |d WYU  |d YDX  |d U3W  |d TYFRS  |d LEAUB  |d OCLCQ  |d UWO  |d UHL  |d LOA  |d K6U  |d LVT  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCQ  |d TEFOD  |d OCLCO 
015 |a GBB7A9242  |2 bnb 
016 7 |a 018390436  |2 Uk 
019 |a 781261746  |a 880372906  |a 1008951417  |a 1015208100  |a 1058327830  |a 1065686563  |a 1069720386  |a 1103279116  |a 1110599997  |a 1113813645  |a 1122501106  |a 1129364538  |a 1135515936  |a 1135829267  |a 1152704656  |a 1192334626  |a 1202536552 
020 |a 9781439811658  |q (electronic bk.) 
020 |a 1439811652  |q (electronic bk.) 
020 |a 9780429131905  |q (e-book : PDF) 
020 |a 0429131909 
020 |a 9781466551282  |q (e-book) 
020 |a 1466551283 
020 |z 9781439811634 
020 |z 1439811636 
024 7 |a 10.1201/b11357  |2 doi 
029 1 |a AU@  |b 000053282896 
029 1 |a DEBBG  |b BV041135266 
029 1 |a DEBBG  |b BV042032576 
029 1 |a DEBSZ  |b 372696147 
029 1 |a DEBSZ  |b 414180461 
029 1 |a NZ1  |b 14243493 
029 1 |a UKMGB  |b 018390436 
035 |a (OCoLC)773298336  |z (OCoLC)781261746  |z (OCoLC)880372906  |z (OCoLC)1008951417  |z (OCoLC)1015208100  |z (OCoLC)1058327830  |z (OCoLC)1065686563  |z (OCoLC)1069720386  |z (OCoLC)1103279116  |z (OCoLC)1110599997  |z (OCoLC)1113813645  |z (OCoLC)1122501106  |z (OCoLC)1129364538  |z (OCoLC)1135515936  |z (OCoLC)1135829267  |z (OCoLC)1152704656  |z (OCoLC)1192334626  |z (OCoLC)1202536552 
037 |a CL0500000429  |b Safari Books Online 
037 |a 2D44C2A7-4502-4BCD-B529-EC4F398CCB34  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .F58 2012eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a BUS073000  |a COM032000  |a COM053000  |2 bisacsh 
049 |a UAMI 
100 1 |a Fitzgerald, Todd. 
245 1 0 |a Information security governance simplified :  |b from the boardroom to the keyboard /  |c Todd Fitzgerald. 
260 |a Boca Raton :  |b CRC Press,  |c ©2012. 
300 |a 1 online resource (xxviii, 381 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
504 |a Includes bibliographical references and index. 
520 |a "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."--  |c Provided by publisher. 
588 0 |a Print version record. 
505 0 |a Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts. 
506 0 |a Open Access  |5 EbpS 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information networks  |x Security measures. 
650 0 |a Information resources management. 
650 0 |a Business intelligence. 
650 0 |a Information technology  |x Security measures. 
650 6 |a Réseaux d'information  |x Sécurité  |x Mesures. 
650 6 |a Gestion de l'information. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a BUSINESS & ECONOMICS  |x Commerce.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Business intelligence  |2 fast 
650 7 |a Information networks  |x Security measures  |2 fast 
650 7 |a Information resources management  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Fitzgerald, Todd.  |t Information security governance simplified.  |d Boca Raton : CRC Press, 2011  |z 9781439811634  |w (DLC) 2011043463 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439811658/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Taylor & Francis  |b TAFR  |n 9780429131905 
938 |a YBP Library Services  |b YANK  |n 15920182 
938 |a Taylor & Francis  |b TAFR  |n CRC0KE10543PDF 
938 |a ebrary  |b EBRY  |n ebr10517983 
938 |a EBSCOhost  |b EBSC  |n 411946 
938 |a YBP Library Services  |b YANK  |n 7060233 
938 |a YBP Library Services  |b YANK  |n 11934338 
938 |a YBP Library Services  |b YANK  |n 11934547 
994 |a 92  |b IZTAP