|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn891397260 |
003 |
OCoLC |
005 |
20231120111741.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
140918t20152015enka ob 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d UIU
|d OCLCF
|d CUI
|d S4S
|d STF
|d B24X7
|d COO
|d OCLCQ
|d LIV
|d D6H
|d LQU
|d UHL
|d VLB
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 907360733
|a 1105178431
|a 1105560648
|
020 |
|
|
|a 9780128004067
|q (e-book)
|
020 |
|
|
|a 0128004061
|q (e-book)
|
020 |
|
|
|z 9780128002476
|
020 |
|
|
|z 0128002476
|
035 |
|
|
|a (OCoLC)891397260
|z (OCoLC)907360733
|z (OCoLC)1105178431
|z (OCoLC)1105560648
|
050 |
|
4 |
|a HD30.2
|b .I2336 2015eb
|
082 |
0 |
4 |
|a 658.4/038
|2 23
|
100 |
1 |
|
|a Iannarelli, John G.,
|e author.
|
245 |
1 |
0 |
|a Information governance and security :
|b protecting and managing your company's proprietary information /
|c John Iannarelli, Michael O'Shaughnessy.
|
264 |
|
1 |
|a Oxford, England ;
|a Waltham, Massachusetts :
|b Elsevier,
|c 2015.
|
264 |
|
4 |
|c �2015
|
300 |
|
|
|a 1 online resource (xvi, 191 pages) :
|b illustrations, graphs
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references at the end of each chapters and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --
|c Edited summary from book.
|
505 |
0 |
|
|a Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
|
505 |
8 |
|
|a Chapter 4 -- The Changing Corporate LandscapeToday's Cyber Environment; The Federal Government; The Private Sector; Why Should Corporate America Care?; References; Chapter 5 -- How Information Governance Fits in the New World; Issues in the New World; References; Chapter 6 -- The Human Element; Cyber; Physical Acts; References; Chapter 7 -- The Technical Side; The Benefits; Concerns Brought About by Technology; References; Chapter 8 -- Balancing Information Governance and Your Company's Mission; Policies; Factors to Consider; References
|
505 |
8 |
|
|a Chapter 9 -- The Case for Information Governance from within Your OrganizationNegative Perceptions of Information Governance; Implementation; References; Chapter 10 -- What to do First; The Basics; How to Determine Information Governance Needs for Your Company; How to Create Information Governance Policies; Methods of Security to Support Information Governance; How to Implement Information Governance Policies; References; Chapter 11 -- What to do Forever; Continuing Efforts; Evaluate Effectiveness of Information Governance Policies
|
505 |
8 |
|
|a Encouraging Accountability and Ownership of Information GovernanceTraining and Education of Employees About Information Governance; References; Chapter 12 -- Charting the Best Future Course for Your Organization; Information Governance Impacts All Facets of an Organization; Closing Thoughts; References; Appendix A; Information Security Personnel Check List; Appendix B; Appendix C; Works Cited; Index
|
650 |
|
0 |
|a Knowledge management.
|
650 |
|
2 |
|a Knowledge Management
|0 (DNLM)D058436
|
650 |
|
6 |
|a Gestion des connaissances.
|0 (CaQQLa)201-0306548
|
650 |
|
7 |
|a Knowledge management
|2 fast
|0 (OCoLC)fst00988184
|
700 |
1 |
|
|a O'Shaughnessy, Michael,
|e author
|
776 |
0 |
8 |
|i Print version:
|a Iannarelli, John G.
|t Information governance and security.
|d Oxford, UK ; Waltham, MA : Butterworth-Heinemann, [2015]
|z 9780128002476
|w (DLC) 2014027431
|w (OCoLC)895299745
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128002476
|z Texto completo
|