Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Information security governance simplified : (Record no. 7289)

MARC details
000 -LEADER
fixed length control field 04838cam a2200385 a 4500
001 - CONTROL NUMBER
control field 17050084
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427101436.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 111118s2012 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011043463
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439811634 (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .F58 2012
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number F.T.I
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fitzgerald, Todd.
245 10 - TITLE STATEMENT
Title Information security governance simplified :
Remainder of title from the boardroom to the keyboard /
Statement of responsibility, etc Todd Fitzgerald ; foreword by Tom Peltier.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton ;
-- London :
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxviii, 403 p. :
Other physical details ill. ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note <br/>Book Description<br/>Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.<br/><br/><br/><br/><br/><br/>Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management.<br/><br/><br/><br/><br/><br/>Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn’t when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.<br/><br/><br/><br/>Table of Contents<br/>Getting Information Security Right – Top to Bottom. Developing Information Strategy. Defining the Security Management Organization. Interacting with the C-Suite. Managing Risk to an Acceptable Level. Creating Effective Information Security Policies. Security Compliance Using Control Frameworks. Managerial Controls – Practical Security Considerations. Technical Controls – Practical Security Considerations. Operational Controls – Practical Security Considerations. The Auditors Have Arrived – Now What? Effective Security Communications. The Law and Information Security. Learning From Information Security Incidents. 17 Ways to Dismantle Information Security Efforts.
520 ## - SUMMARY, ETC.
Summary, etc "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. "--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information resources management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS / Commerce.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Information Technology.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General.
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3509">http://repository.fue.edu.eg/xmlui/handle/123456789/3509</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Information systems ) Main library Main library A2 30/12/2012 Al Fagr Publishing 500.00 PU   005.8 F.T.I 00009639 19/02/2025 30/12/2012 Books