Information security governance: a practical development and implementation approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
John Wiley & Sons
©2009
|
Schriftenreihe: | Wiley series in systems engineering and management
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Beschreibung: | Includes bibliographical references and index This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive boo |
Beschreibung: | 1 Online-Ressource (xv, 189 pages) |
ISBN: | 9780470476000 0470476001 9780470476017 047047601X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043390077 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2009 |||| o||u| ||||||eng d | ||
020 | |a 9780470476000 |c electronic bk. |9 978-0-470-47600-0 | ||
020 | |a 0470476001 |c electronic bk. |9 0-470-47600-1 | ||
020 | |a 9780470476017 |9 978-0-470-47601-7 | ||
020 | |a 047047601X |9 0-470-47601-X | ||
024 | 7 | |a 10.1002/9780470476017 |2 doi | |
035 | |a (ZDB-35-WIC)ocn428170752 | ||
035 | |a (OCoLC)428170752 | ||
035 | |a (DE-599)BVBBV043390077 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 658.4/78 |2 22 | |
100 | 1 | |a Brotby, W. Krag |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security governance |b a practical development and implementation approach |c Krag Brotby |
264 | 1 | |a Hoboken, N.J. |b John Wiley & Sons |c ©2009 | |
300 | |a 1 Online-Ressource (xv, 189 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley series in systems engineering and management | |
500 | |a Includes bibliographical references and index | ||
500 | |a This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive boo | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a Computer security / Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Führung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security / Management | |
650 | 4 | |a Information technology / Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-470-13118-3 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028808661 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175963893792768 |
---|---|
any_adam_object | |
author | Brotby, W. Krag |
author_facet | Brotby, W. Krag |
author_role | aut |
author_sort | Brotby, W. Krag |
author_variant | w k b wk wkb |
building | Verbundindex |
bvnumber | BV043390077 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn428170752 (OCoLC)428170752 (DE-599)BVBBV043390077 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03023nmm a2200601zc 4500</leader><controlfield tag="001">BV043390077</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470476000</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-47600-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470476001</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-47600-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470476017</subfield><subfield code="9">978-0-470-47601-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">047047601X</subfield><subfield code="9">0-470-47601-X</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9780470476017</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn428170752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)428170752</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043390077</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brotby, W. Krag</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security governance</subfield><subfield code="b">a practical development and implementation approach</subfield><subfield code="c">Krag Brotby</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 189 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley series in systems engineering and management</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive boo</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-470-13118-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028808661</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043390077 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:38Z |
institution | BVB |
isbn | 9780470476000 0470476001 9780470476017 047047601X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028808661 |
oclc_num | 428170752 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource (xv, 189 pages) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | John Wiley & Sons |
record_format | marc |
series2 | Wiley series in systems engineering and management |
spelling | Brotby, W. Krag Verfasser aut Information security governance a practical development and implementation approach Krag Brotby Hoboken, N.J. John Wiley & Sons ©2009 1 Online-Ressource (xv, 189 pages) txt rdacontent c rdamedia cr rdacarrier Wiley series in systems engineering and management Includes bibliographical references and index This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the strategy, guiding the reader toward practical, workable solutions. A broad range of business managers, IT security managers, and information security managers will value the guidance, action plans, and sample policies provided in this comprehensive boo Computer security Information technology BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer security / Management fast Data protection fast Information technology / Security measures fast Führung Wirtschaft Data protection Computer security / Management Information technology / Security measures Erscheint auch als Druck-Ausgabe, Hardcover 978-0-470-13118-3 https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Brotby, W. Krag Information security governance a practical development and implementation approach Computer security Information technology BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer security / Management fast Data protection fast Information technology / Security measures fast Führung Wirtschaft Data protection Computer security / Management Information technology / Security measures |
title | Information security governance a practical development and implementation approach |
title_auth | Information security governance a practical development and implementation approach |
title_exact_search | Information security governance a practical development and implementation approach |
title_full | Information security governance a practical development and implementation approach Krag Brotby |
title_fullStr | Information security governance a practical development and implementation approach Krag Brotby |
title_full_unstemmed | Information security governance a practical development and implementation approach Krag Brotby |
title_short | Information security governance |
title_sort | information security governance a practical development and implementation approach |
title_sub | a practical development and implementation approach |
topic | Computer security Information technology BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Computer security / Management fast Data protection fast Information technology / Security measures fast Führung Wirtschaft Data protection Computer security / Management Information technology / Security measures |
topic_facet | Computer security Information technology BUSINESS & ECONOMICS / Workplace Culture BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development Computer security / Management Data protection Information technology / Security measures Führung Wirtschaft |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9780470476017 |
work_keys_str_mv | AT brotbywkrag informationsecuritygovernanceapracticaldevelopmentandimplementationapproach |