000 | 03550nam a2200565Ki 4500 | ||
---|---|---|---|
001 | ocn773298336 | ||
003 | OCoLC | ||
005 | 20210822113955.0 | ||
006 | m d | ||
007 | cr cnu---unuuu | ||
008 | 120119s2012 flua ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _cN$T |
||
020 | _a9781439811658 (electronic bk.) | ||
020 | _a1439811652 (electronic bk.) | ||
020 | _z9781439811634 | ||
020 | _z1439811636 | ||
035 | _a(OCoLC)773298336 | ||
035 |
_a411946 _b(N$T) |
||
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aN$TA | ||
100 | 1 |
_aFitzgerald, Todd, _eauthor _94511 |
|
245 | 1 | 0 |
_aInformation security governance simplified : _bfrom the boardroom to the keyboard / _cTodd Fitzgerald. |
264 | 1 |
_aBoca Raton : _bCRC Press, _c[2012] |
|
264 | 4 | _c©2012 | |
300 |
_a1 online resource (xxviii, 381 pages) : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
520 |
_a"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."-- _cProvided by publisher. |
||
504 | _aIncludes bibliographical references and index. | ||
588 | _aDescription based on print version record. | ||
650 | 0 |
_aInformation networks _xSecurity measures. _94512 |
|
650 | 0 |
_aInformation resources management. _94513 |
|
650 | 0 |
_aBusiness intelligence. _94514 |
|
650 | 0 |
_aInformation technology _xSecurity measures. _94515 |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Commerce. _2bisacsh _94516 |
|
650 | 7 |
_aCOMPUTERS / Information Technology. _2bisacsh _94517 |
|
650 | 7 |
_aCOMPUTERS / Security / General. _2bisacsh _94518 |
|
650 | 7 |
_aCOMPUTERS / Internet / Security. _2bisacsh _94519 |
|
650 | 7 |
_aCOMPUTERS / Networking / Security. _2bisacsh _94520 |
|
655 | 4 |
_aElectronic books. _9313 |
|
776 | 0 | 8 |
_iPrint version: _aFitzgerald, Todd. _tInformation security governance simplified. _dBoca Raton : CRC Press, 2011 _z9781439811634 _w(DLC) 2011043463 |
856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=411946 |
910 | _aCpp1723AUTO | ||
942 | _cEBK | ||
994 |
_a02 _bN$T |
||
999 |
_c887 _d887 |