Governance and Internal Controls for Cutting Edge IT.:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Publishing
2013
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (133 pages) |
ISBN: | 9781849284530 1849284539 9781849284547 1849284547 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350058 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781849284530 |9 978-1-84928-453-0 | ||
020 | |a 1849284539 |9 1-84928-453-9 | ||
020 | |a 9781849284547 |9 978-1-84928-454-7 | ||
020 | |a 1849284547 |9 1-84928-454-7 | ||
035 | |a (ZDB-4-ITC)ocn843642481 | ||
035 | |a (OCoLC)843642481 | ||
035 | |a (DE-599)BVBBV045350058 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 650.11 | |
100 | 1 | |a Worstell, Karen F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Governance and Internal Controls for Cutting Edge IT. |
264 | 1 | |a Ely |b IT Governance Publishing |c 2013 | |
300 | |a 1 online resource (133 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards | |
650 | 7 | |a BUSINESS & ECONOMICS / Time Management |2 bisacsh | |
650 | 7 | |a SELF-HELP / Time Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a Information technology / Management |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Business enterprises |x Information technology |x Management |a Business enterprises |x Information technology |x Security measures |a Information technology |x Management |a Information technology |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781849283762 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736712 |
Datensatz im Suchindex
_version_ | 1804179174410158080 |
---|---|
any_adam_object | |
author | Worstell, Karen F. |
author_facet | Worstell, Karen F. |
author_role | aut |
author_sort | Worstell, Karen F. |
author_variant | k f w kf kfw |
building | Verbundindex |
bvnumber | BV045350058 |
collection | ZDB-4-ITC |
contents | In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards |
ctrlnum | (ZDB-4-ITC)ocn843642481 (OCoLC)843642481 (DE-599)BVBBV045350058 |
dewey-full | 650.11 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 650 - Management and auxiliary services |
dewey-raw | 650.11 |
dewey-search | 650.11 |
dewey-sort | 3650.11 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02066nmm a2200421zc 4500</leader><controlfield tag="001">BV045350058</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849284530</subfield><subfield code="9">978-1-84928-453-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849284539</subfield><subfield code="9">1-84928-453-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849284547</subfield><subfield code="9">978-1-84928-454-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849284547</subfield><subfield code="9">1-84928-454-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn843642481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)843642481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350058</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">650.11</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Worstell, Karen F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Governance and Internal Controls for Cutting Edge IT.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (133 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Time Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SELF-HELP / Time Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Information technology</subfield><subfield code="x">Management</subfield><subfield code="a">Business enterprises</subfield><subfield code="x">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781849283762</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736712</subfield></datafield></record></collection> |
id | DE-604.BV045350058 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781849284530 1849284539 9781849284547 1849284547 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736712 |
oclc_num | 843642481 |
open_access_boolean | |
physical | 1 online resource (133 pages) |
psigel | ZDB-4-ITC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Worstell, Karen F. Verfasser aut Governance and Internal Controls for Cutting Edge IT. Ely IT Governance Publishing 2013 1 online resource (133 pages) txt rdacontent c rdamedia cr rdacarrier Print version record In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards BUSINESS & ECONOMICS / Time Management bisacsh SELF-HELP / Time Management bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh Information technology / Management fast Information technology / Security measures fast Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures Erscheint auch als Druck-Ausgabe 9781849283762 |
spellingShingle | Worstell, Karen F. Governance and Internal Controls for Cutting Edge IT. In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards BUSINESS & ECONOMICS / Time Management bisacsh SELF-HELP / Time Management bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh Information technology / Management fast Information technology / Security measures fast Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures |
title | Governance and Internal Controls for Cutting Edge IT. |
title_auth | Governance and Internal Controls for Cutting Edge IT. |
title_exact_search | Governance and Internal Controls for Cutting Edge IT. |
title_full | Governance and Internal Controls for Cutting Edge IT. |
title_fullStr | Governance and Internal Controls for Cutting Edge IT. |
title_full_unstemmed | Governance and Internal Controls for Cutting Edge IT. |
title_short | Governance and Internal Controls for Cutting Edge IT. |
title_sort | governance and internal controls for cutting edge it |
topic | BUSINESS & ECONOMICS / Time Management bisacsh SELF-HELP / Time Management bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh Information technology / Management fast Information technology / Security measures fast Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures |
topic_facet | BUSINESS & ECONOMICS / Time Management SELF-HELP / Time Management BUSINESS & ECONOMICS / Corporate Governance Information technology / Management Information technology / Security measures Business enterprises Information technology Management Business enterprises Information technology Security measures Information technology Management Information technology Security measures |
work_keys_str_mv | AT worstellkarenf governanceandinternalcontrolsforcuttingedgeit |