Governance and Internal Controls for Cutting Edge IT:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Publishing
2013
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards Includes bibliographical references Cutting edge IT -- Governance -- Legislative and regulatory compliance concerns -- Getting the business case right -- Service level management -- Security and control approach -- Data management -- Business continuity and recovery -- Secure IT-enabled organizations |
Beschreibung: | 1 Online-Ressource (133 pages) |
ISBN: | 9781849284530 1849284539 1849283761 9781849283762 9781849284547 1849284547 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042741281 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150806s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781849284530 |9 978-1-84928-453-0 | ||
020 | |a 1849284539 |9 1-84928-453-9 | ||
020 | |a 1849283761 |9 1-84928-376-1 | ||
020 | |a 9781849283762 |9 978-1-84928-376-2 | ||
020 | |a 9781849284547 |9 978-1-84928-454-7 | ||
020 | |a 1849284547 |9 1-84928-454-7 | ||
035 | |a (OCoLC)843642481 | ||
035 | |a (DE-599)BVBBV042741281 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 650.11 | |
100 | 1 | |a Worstell, Karen F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Governance and Internal Controls for Cutting Edge IT |
264 | 1 | |a Ely |b IT Governance Publishing |c 2013 | |
300 | |a 1 Online-Ressource (133 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards | ||
500 | |a Includes bibliographical references | ||
500 | |a Cutting edge IT -- Governance -- Legislative and regulatory compliance concerns -- Getting the business case right -- Service level management -- Security and control approach -- Data management -- Business continuity and recovery -- Secure IT-enabled organizations | ||
650 | 4 | |a Business / Management | |
650 | 4 | |a Business | |
650 | 4 | |a Governance | |
650 | 4 | |a Information technology / Management | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security | |
650 | 4 | |a Risk management | |
650 | 7 | |a BUSINESS & ECONOMICS / Time Management |2 bisacsh | |
650 | 7 | |a SELF-HELP / Time Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business enterprises |x Information technology |x Management | |
650 | 4 | |a Business enterprises |x Information technology |x Security measures | |
650 | 4 | |a Information technology |x Management | |
650 | 4 | |a Information technology |x Security measures | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571559 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBU |a ZDB-4-NLEBK | ||
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028172151 |
Datensatz im Suchindex
_version_ | 1804174955395416064 |
---|---|
any_adam_object | |
author | Worstell, Karen F. |
author_facet | Worstell, Karen F. |
author_role | aut |
author_sort | Worstell, Karen F. |
author_variant | k f w kf kfw |
building | Verbundindex |
bvnumber | BV042741281 |
collection | ZDB-4-EBU ZDB-4-NLEBK |
ctrlnum | (OCoLC)843642481 (DE-599)BVBBV042741281 |
dewey-full | 650.11 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 650 - Management and auxiliary services |
dewey-raw | 650.11 |
dewey-search | 650.11 |
dewey-sort | 3650.11 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02795nmm a2200589zc 4500</leader><controlfield tag="001">BV042741281</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150806s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849284530</subfield><subfield code="9">978-1-84928-453-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849284539</subfield><subfield code="9">1-84928-453-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283761</subfield><subfield code="9">1-84928-376-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283762</subfield><subfield code="9">978-1-84928-376-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849284547</subfield><subfield code="9">978-1-84928-454-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849284547</subfield><subfield code="9">1-84928-454-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)843642481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042741281</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">650.11</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Worstell, Karen F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Governance and Internal Controls for Cutting Edge IT</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (133 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cutting edge IT -- Governance -- Legislative and regulatory compliance concerns -- Getting the business case right -- Service level management -- Security and control approach -- Data management -- Business continuity and recovery -- Secure IT-enabled organizations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Governance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Time Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SELF-HELP / Time Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571559</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028172151</subfield></datafield></record></collection> |
id | DE-604.BV042741281 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:08:37Z |
institution | BVB |
isbn | 9781849284530 1849284539 1849283761 9781849283762 9781849284547 1849284547 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028172151 |
oclc_num | 843642481 |
open_access_boolean | |
physical | 1 Online-Ressource (133 pages) |
psigel | ZDB-4-EBU ZDB-4-NLEBK FLA_PDA_EBU |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Worstell, Karen F. Verfasser aut Governance and Internal Controls for Cutting Edge IT Ely IT Governance Publishing 2013 1 Online-Ressource (133 pages) txt rdacontent c rdamedia cr rdacarrier In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards Includes bibliographical references Cutting edge IT -- Governance -- Legislative and regulatory compliance concerns -- Getting the business case right -- Service level management -- Security and control approach -- Data management -- Business continuity and recovery -- Secure IT-enabled organizations Business / Management Business Governance Information technology / Management Information technology / Security measures Data protection Computer security Risk management BUSINESS & ECONOMICS / Time Management bisacsh SELF-HELP / Time Management bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh Unternehmen Wirtschaft Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571559 Aggregator Volltext |
spellingShingle | Worstell, Karen F. Governance and Internal Controls for Cutting Edge IT Business / Management Business Governance Information technology / Management Information technology / Security measures Data protection Computer security Risk management BUSINESS & ECONOMICS / Time Management bisacsh SELF-HELP / Time Management bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh Unternehmen Wirtschaft Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures |
title | Governance and Internal Controls for Cutting Edge IT |
title_auth | Governance and Internal Controls for Cutting Edge IT |
title_exact_search | Governance and Internal Controls for Cutting Edge IT |
title_full | Governance and Internal Controls for Cutting Edge IT |
title_fullStr | Governance and Internal Controls for Cutting Edge IT |
title_full_unstemmed | Governance and Internal Controls for Cutting Edge IT |
title_short | Governance and Internal Controls for Cutting Edge IT |
title_sort | governance and internal controls for cutting edge it |
topic | Business / Management Business Governance Information technology / Management Information technology / Security measures Data protection Computer security Risk management BUSINESS & ECONOMICS / Time Management bisacsh SELF-HELP / Time Management bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh Unternehmen Wirtschaft Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures |
topic_facet | Business / Management Business Governance Information technology / Management Information technology / Security measures Data protection Computer security Risk management BUSINESS & ECONOMICS / Time Management SELF-HELP / Time Management BUSINESS & ECONOMICS / Corporate Governance Unternehmen Wirtschaft Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571559 |
work_keys_str_mv | AT worstellkarenf governanceandinternalcontrolsforcuttingedgeit |