Global perspectives on information security regulations: compliance, controls, and assurance
"This book summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators."
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2022.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators." |
Beschreibung: | 24 PDFs (309 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799883920 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00270400 | ||
003 | IGIG | ||
005 | 20220519134413.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 220520s2022 pau fob 001 0 eng d | ||
020 | |a 9781799883920 |q PDF | ||
020 | |z 1799883922 | ||
020 | |z 9781799883906 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-7998-8390-6 |2 doi | |
035 | |a (CaBNVSL)slc00002585 | ||
035 | |a (OCoLC)1319603799 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b G57 2022eb | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Global perspectives on information security regulations |b compliance, controls, and assurance |c Guillermo Francia III, and Jeffrey Zanzig, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2022. | |
300 | |a 24 PDFs (309 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Legislation and the cybersecurity environment. Chapter 1. US cybersecurity laws and regulations: current trends and recommendations for improvement ; Chapter 2. Automotive vehicle security standards, regulations, and compliance -- Section 2. Approaches to cybersecurity training. Chapter 3. NERC CIP standards: review, compliance, and training ; Chapter 4. The potential of gaming to ameliorate human factors in information security compliance -- Section 3. Cybersecurity consulting and assurance. Chapter 5. Using the NIST framework and COBIT 2019 in offering cybersecurity consulting and assurance services ; Chapter 6. Service organization control (SOC) reports and their usefulness -- Section 4. Other information security concerns. Chapter 7. Corporate governance and financial risk disclosure: empirical evidence in the Portuguese capital market ; Chapter 8. Implications of artificial intelligence-driven deepfakes for cybersecurity and regulation in Nigeria: theorising for cyberfakes and cyberviolence ; Chapter 9. The effect of protection of personal information act no. 4 of 2013 on research data ethics in South Africa. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators." | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 05/20/2022). | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer security |x Law and legislation. | |
650 | 0 | |a Data protection. | |
700 | 1 | |a Francia, Guillermo, |e editor. | |
700 | 1 | |a Zanzig, Jeffrey Scott, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1799883906 |z 9781799883906 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8390-6 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00270400 |
---|---|
_version_ | 1816797085606871041 |
adam_text | |
any_adam_object | |
author2 | Francia, Guillermo Zanzig, Jeffrey Scott |
author2_role | edt edt |
author2_variant | g f gf j s z js jsz |
author_facet | Francia, Guillermo Zanzig, Jeffrey Scott |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 G57 2022eb |
callnumber-search | QA76.9.A25 G57 2022eb |
callnumber-sort | QA 276.9 A25 G57 42022EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Section 1. Legislation and the cybersecurity environment. Chapter 1. US cybersecurity laws and regulations: current trends and recommendations for improvement ; Chapter 2. Automotive vehicle security standards, regulations, and compliance -- Section 2. Approaches to cybersecurity training. Chapter 3. NERC CIP standards: review, compliance, and training ; Chapter 4. The potential of gaming to ameliorate human factors in information security compliance -- Section 3. Cybersecurity consulting and assurance. Chapter 5. Using the NIST framework and COBIT 2019 in offering cybersecurity consulting and assurance services ; Chapter 6. Service organization control (SOC) reports and their usefulness -- Section 4. Other information security concerns. Chapter 7. Corporate governance and financial risk disclosure: empirical evidence in the Portuguese capital market ; Chapter 8. Implications of artificial intelligence-driven deepfakes for cybersecurity and regulation in Nigeria: theorising for cyberfakes and cyberviolence ; Chapter 9. The effect of protection of personal information act no. 4 of 2013 on research data ethics in South Africa. |
ctrlnum | (CaBNVSL)slc00002585 (OCoLC)1319603799 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03141nam a2200457 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00270400</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20220519134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">220520s2022 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799883920</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1799883922</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799883906</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-8390-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00002585</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1319603799</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">G57 2022eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Global perspectives on information security regulations </subfield><subfield code="b">compliance, controls, and assurance </subfield><subfield code="c">Guillermo Francia III, and Jeffrey Zanzig, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">24 PDFs (309 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Legislation and the cybersecurity environment. Chapter 1. US cybersecurity laws and regulations: current trends and recommendations for improvement ; Chapter 2. Automotive vehicle security standards, regulations, and compliance -- Section 2. Approaches to cybersecurity training. Chapter 3. NERC CIP standards: review, compliance, and training ; Chapter 4. The potential of gaming to ameliorate human factors in information security compliance -- Section 3. Cybersecurity consulting and assurance. Chapter 5. Using the NIST framework and COBIT 2019 in offering cybersecurity consulting and assurance services ; Chapter 6. Service organization control (SOC) reports and their usefulness -- Section 4. Other information security concerns. Chapter 7. Corporate governance and financial risk disclosure: empirical evidence in the Portuguese capital market ; Chapter 8. Implications of artificial intelligence-driven deepfakes for cybersecurity and regulation in Nigeria: theorising for cyberfakes and cyberviolence ; Chapter 9. The effect of protection of personal information act no. 4 of 2013 on research data ethics in South Africa.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators."</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/20/2022).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Francia, Guillermo,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zanzig, Jeffrey Scott,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799883906</subfield><subfield code="z">9781799883906</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8390-6</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00270400 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:58Z |
institution | BVB |
isbn | 9781799883920 |
language | English |
oclc_num | 1319603799 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 24 PDFs (309 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global, |
record_format | marc |
spelling | Global perspectives on information security regulations compliance, controls, and assurance Guillermo Francia III, and Jeffrey Zanzig, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2022. 24 PDFs (309 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Legislation and the cybersecurity environment. Chapter 1. US cybersecurity laws and regulations: current trends and recommendations for improvement ; Chapter 2. Automotive vehicle security standards, regulations, and compliance -- Section 2. Approaches to cybersecurity training. Chapter 3. NERC CIP standards: review, compliance, and training ; Chapter 4. The potential of gaming to ameliorate human factors in information security compliance -- Section 3. Cybersecurity consulting and assurance. Chapter 5. Using the NIST framework and COBIT 2019 in offering cybersecurity consulting and assurance services ; Chapter 6. Service organization control (SOC) reports and their usefulness -- Section 4. Other information security concerns. Chapter 7. Corporate governance and financial risk disclosure: empirical evidence in the Portuguese capital market ; Chapter 8. Implications of artificial intelligence-driven deepfakes for cybersecurity and regulation in Nigeria: theorising for cyberfakes and cyberviolence ; Chapter 9. The effect of protection of personal information act no. 4 of 2013 on research data ethics in South Africa. Restricted to subscribers or individual electronic text purchasers. "This book summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators." Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/20/2022). Computer security. Computer security Law and legislation. Data protection. Francia, Guillermo, editor. Zanzig, Jeffrey Scott, editor. IGI Global, publisher. Print version: 1799883906 9781799883906 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8390-6 Volltext |
spellingShingle | Global perspectives on information security regulations compliance, controls, and assurance Section 1. Legislation and the cybersecurity environment. Chapter 1. US cybersecurity laws and regulations: current trends and recommendations for improvement ; Chapter 2. Automotive vehicle security standards, regulations, and compliance -- Section 2. Approaches to cybersecurity training. Chapter 3. NERC CIP standards: review, compliance, and training ; Chapter 4. The potential of gaming to ameliorate human factors in information security compliance -- Section 3. Cybersecurity consulting and assurance. Chapter 5. Using the NIST framework and COBIT 2019 in offering cybersecurity consulting and assurance services ; Chapter 6. Service organization control (SOC) reports and their usefulness -- Section 4. Other information security concerns. Chapter 7. Corporate governance and financial risk disclosure: empirical evidence in the Portuguese capital market ; Chapter 8. Implications of artificial intelligence-driven deepfakes for cybersecurity and regulation in Nigeria: theorising for cyberfakes and cyberviolence ; Chapter 9. The effect of protection of personal information act no. 4 of 2013 on research data ethics in South Africa. Computer security. Computer security Law and legislation. Data protection. |
title | Global perspectives on information security regulations compliance, controls, and assurance |
title_auth | Global perspectives on information security regulations compliance, controls, and assurance |
title_exact_search | Global perspectives on information security regulations compliance, controls, and assurance |
title_full | Global perspectives on information security regulations compliance, controls, and assurance Guillermo Francia III, and Jeffrey Zanzig, editor. |
title_fullStr | Global perspectives on information security regulations compliance, controls, and assurance Guillermo Francia III, and Jeffrey Zanzig, editor. |
title_full_unstemmed | Global perspectives on information security regulations compliance, controls, and assurance Guillermo Francia III, and Jeffrey Zanzig, editor. |
title_short | Global perspectives on information security regulations |
title_sort | global perspectives on information security regulations compliance controls and assurance |
title_sub | compliance, controls, and assurance |
topic | Computer security. Computer security Law and legislation. Data protection. |
topic_facet | Computer security. Computer security Law and legislation. Data protection. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-8390-6 |
work_keys_str_mv | AT franciaguillermo globalperspectivesoninformationsecurityregulationscompliancecontrolsandassurance AT zanzigjeffreyscott globalperspectivesoninformationsecurityregulationscompliancecontrolsandassurance AT igiglobal globalperspectivesoninformationsecurityregulationscompliancecontrolsandassurance |