Information Security Governance Simplified : : From the Boardroom to the Keyboard / / Todd Fitzgerald, Tom Peltier.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to buil...
Saved in:
VerfasserIn: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Boca Raton : : Taylor & Francis,, 2011. |
Year of Publication: | 2011 |
Language: | English |
Physical Description: | 1 online resource (433 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993598304904498 |
---|---|
ctrlnum |
(CKB)5710000000124312 (NjHacI)995710000000124312 (EXLCZ)995710000000124312 |
collection |
bib_alma |
record_format |
marc |
spelling |
Fitzgerald, Todd, author. Information Security Governance Simplified : From the Boardroom to the Keyboard / Todd Fitzgerald, Tom Peltier. Information Security Governance Simplified Boca Raton : Taylor & Francis, 2011. 1 online resource (433 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on publisher supplied metadata and other sources. Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. Includes bibliographical references and index. Computer security. Peltier, Tom, author. |
language |
English |
format |
eBook |
author |
Fitzgerald, Todd, Peltier, Tom, |
spellingShingle |
Fitzgerald, Todd, Peltier, Tom, Information Security Governance Simplified : From the Boardroom to the Keyboard / |
author_facet |
Fitzgerald, Todd, Peltier, Tom, Peltier, Tom, |
author_variant |
t f tf t p tp |
author_role |
VerfasserIn VerfasserIn |
author2 |
Peltier, Tom, |
author2_role |
TeilnehmendeR |
author_sort |
Fitzgerald, Todd, |
title |
Information Security Governance Simplified : From the Boardroom to the Keyboard / |
title_sub |
From the Boardroom to the Keyboard / |
title_full |
Information Security Governance Simplified : From the Boardroom to the Keyboard / Todd Fitzgerald, Tom Peltier. |
title_fullStr |
Information Security Governance Simplified : From the Boardroom to the Keyboard / Todd Fitzgerald, Tom Peltier. |
title_full_unstemmed |
Information Security Governance Simplified : From the Boardroom to the Keyboard / Todd Fitzgerald, Tom Peltier. |
title_auth |
Information Security Governance Simplified : From the Boardroom to the Keyboard / |
title_alt |
Information Security Governance Simplified |
title_new |
Information Security Governance Simplified : |
title_sort |
information security governance simplified : from the boardroom to the keyboard / |
publisher |
Taylor & Francis, |
publishDate |
2011 |
physical |
1 online resource (433 pages) |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 F589 42011 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT fitzgeraldtodd informationsecuritygovernancesimplifiedfromtheboardroomtothekeyboard AT peltiertom informationsecuritygovernancesimplifiedfromtheboardroomtothekeyboard AT fitzgeraldtodd informationsecuritygovernancesimplified AT peltiertom informationsecuritygovernancesimplified |
status_str |
n |
ids_txt_mv |
(CKB)5710000000124312 (NjHacI)995710000000124312 (EXLCZ)995710000000124312 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Information Security Governance Simplified : From the Boardroom to the Keyboard / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1787553521065787392 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02404nam a2200301 i 4500</leader><controlfield tag="001">993598304904498</controlfield><controlfield tag="005">20230704082618.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230704s2011 flu ob 001 0 eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b11357</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5710000000124312</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995710000000124312</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995710000000124312</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25 </subfield><subfield code="b">.F589 2011</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fitzgerald, Todd,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security Governance Simplified :</subfield><subfield code="b">From the Boardroom to the Keyboard /</subfield><subfield code="c">Todd Fitzgerald, Tom Peltier.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Information Security Governance Simplified </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton :</subfield><subfield code="b">Taylor & Francis,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (433 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peltier, Tom,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-08 12:22:20 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-05-13 19:27:32 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338493060004498&Force_direct=true</subfield><subfield code="Z">5338493060004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338493060004498</subfield></datafield></record></collection> |