Information security governance simplified : (Record no. 3565)

MARC details
000 -LEADER
fixed length control field 03525cam a2200349Ii 4500
001 - CONTROL NUMBER
control field 9780429131905
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180331s2012 flua ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429131905
Qualifying information (e-book : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466551282
Qualifying information (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781439811634
Qualifying information (hardback)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/b11357
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)773298336
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .F58 2012
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number F554
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fitzgerald, Todd.,
Relator term author.
9 (RLIN) 4511
245 10 - TITLE STATEMENT
Title Information security governance simplified :
Remainder of title from the boardroom to the keyboard /
Statement of responsibility, etc. Todd Fitzgerald.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xxviii, 403 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note An Auerbach book.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note ch. 1. Getting information security right : top to bottom -- chapter 2. Developing information security strategy -- chapter 3. Defining the security management organization -- chapter 4. Interacting with the C-suite -- chapter 5. Managing risk to an acceptable level -- chapter 6. Creating effective information security policies -- chapter 7. Security compliance using control frameworks -- chapter 8. Managerial controls : practical security considerations -- chapter 9. Technical controls : practical security considerations -- chapter 10. Operational controls : practical security considerations -- chapter 11. The auditors have arrived, now what? -- chapter 12. Effective security communications -- chapter 13. The law and information security -- chapter 14. Learning from information security incidents -- chapter 15. 17 ways to dismantle information security governance efforts.
520 ## - SUMMARY, ETC.
Summary, etc. Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. --
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information networks
General subdivision Security measures.
9 (RLIN) 4512
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business intelligence.
9 (RLIN) 4514
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information resources management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Security measures.
9 (RLIN) 4515
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781439811634
Record control number (DLC) 2011043463
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781439811658">https://www.taylorfrancis.com/books/9781439811658</a>
Public note Taylor & Francis .
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-books

No items available.