000 02981nam a2200421 a 4500
001 EBC826929
003 MiAaPQ
005 20240120133050.0
006 m o d |
007 cr cn|||||||||
008 111118s2012 fluac sb 001 0 eng d
010 _z 2011043463
020 _z9781439811634 (hardback)
020 _a9781439811658 (electronic bk.)
035 _a(MiAaPQ)EBC826929
035 _a(Au-PeEL)EBL826929
035 _a(CaPaEBR)ebr10517983
035 _a(CaONFJC)MIL352549
035 _a(OCoLC)785337393
040 _aMiAaPQ
_cMiAaPQ
_dMiAaPQ
050 4 _aTK5105.59
_b.F58 2012
082 0 4 _a005.8
_223
100 1 _aFitzgerald, Todd.
245 1 0 _aInformation security governance simplified
_h[electronic resource] :
_bfrom the boardroom to the keyboard /
_cTodd Fitzgerald ; foreword by Tom Peltier.
260 _aBoca Raton [Fla.] :
_bCRC Press,
_c2012.
300 _axxviii, 381 p. :
_bill., port.
500 _a"An Auerbach book."
504 _aIncludes bibliographical references and index.
520 _a"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations"--
_cProvided by publisher.
533 _aElectronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
650 0 _aInformation networks
_xSecurity measures.
650 0 _aInformation resources management.
650 0 _aBusiness intelligence.
650 0 _aInformation technology
_xSecurity measures.
655 4 _aElectronic books.
710 2 _aProQuest (Firm)
856 4 0 _uhttps://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=826929
_zClick to View
999 _c72595
_d72595