Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information security governance simp...
~
Fitzgerald, Todd.
Information security governance simplified : = from the boardroom to the keyboard /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Information security governance simplified :/ Todd Fitzgerald ; foreword by Tom Peltier.
Reminder of title:
from the boardroom to the keyboard /
Author:
Fitzgerald, Todd.
Published:
Boca Raton ;CRC Press, : c2012.,
Description:
xxviii, 403 p. :ill. ; : 24 cm.;
Subject:
Information networks - Security measures. -
ISBN:
9781439811634 (Cloth) :
Information security governance simplified : = from the boardroom to the keyboard /
Fitzgerald, Todd.
Information security governance simplified :
from the boardroom to the keyboard /Todd Fitzgerald ; foreword by Tom Peltier. - Boca Raton ;CRC Press,c2012. - xxviii, 403 p. :ill. ;24 cm.
Includes bibliographical references and index.
"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. "--
ISBN: 9781439811634 (Cloth) :NT2360
LCCN: 2011043463Subjects--Topical Terms:
566449
Information networks
--Security measures.
LC Class. No.: TK5105.59 / .F58 2012
Dewey Class. No.: 005.8
Information security governance simplified : = from the boardroom to the keyboard /
LDR
:02001cam a2200169 a 4500
001
709280
008
120828s2012 flua b 001 0 eng
010
$a
2011043463
020
$a
9781439811634 (Cloth) :
$c
NT2360
035
$a
17050084
040
$a
DLC
$c
DLC
$d
DLC
$c
NFU
050
0 0
$a
TK5105.59
$b
.F58 2012
082
0 0
$a
005.8
$2
23
100
1
$a
Fitzgerald, Todd.
$3
720457
245
1 0
$a
Information security governance simplified :
$b
from the boardroom to the keyboard /
$c
Todd Fitzgerald ; foreword by Tom Peltier.
260
$a
Boca Raton ;
$a
London :
$c
c2012.
$b
CRC Press,
300
$a
xxviii, 403 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
520
$a
"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. "--
$c
Provided by publisher.
650
0
$a
Information networks
$x
Security measures.
$3
566449
650
0
$a
Information resources management.
$3
562753
650
0
$a
Business intelligence.
$3
557121
650
0
$a
Information technology
$x
Security measures.
$3
566453
based on 0 review(s)
ALL
圖書館3F 書庫
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
E036896
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
005.8 F553 2012
一般使用(Normal)
On shelf
0
Reserve
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login