000 02838nam a22003615i 4500
001 279234
003 MX-SnUAN
005 20160429153937.0
007 cr nn 008mamaa
008 150903s2009 xxu| o |||| 0|eng d
020 _a9780387799841
_99780387799841
024 7 _a10.1007/9780387799841
_2doi
035 _avtls000333054
039 9 _a201509030223
_bVLOAD
_c201404122335
_dVLOAD
_c201404092115
_dVLOAD
_y201402041101
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
100 1 _aSolms, S.H.
_eautor
_9303436
245 1 0 _aInformation Security Governance /
_cby S.H. Solms, Rossouw Solms.
264 1 _aBoston, MA :
_bSpringer US,
_c2009.
300 _axiv, 138 páginas
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
500 _aSpringer eBooks
505 0 _aAn Introduction to Corporate Governance -- Information Technology Governance -- Information Security and Information Security Governance -- Introducing the Information Security Governance Model -- The Use of Best Practice Standards and Guidelines in Information Security Governance -- The Direct Part of the Model – An Information Security Policy Architecture -- The Control Part of the Model – An Information Security Compliance Management Environment -- IT Risk Management -- Organizing the Information Security Function -- Information Security Education, Training and Awareness -- A Methodology for Establishing an Information Security Governance Environment.
520 _aIT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry. Key Features: The book provides a point of entry into the subject with an easy-to-understand model of Information Security Governance Book addresses information security from the governance side, with special emphasis on the accountability of top management Ideal for the professional market as it discusses some international best practices for IT Security Governance in detail
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aSolms, Rossouw.
_eautor
_9303437
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9780387799834
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-0-387-79984-1
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c279234
_d279234