Information Security GovernanceAuthors:
- S.H. Solms,
- Rossouw Solms
- …show all 2hide
ISBN: 978-0-387-79983-4 (Print) 978-0-387-79984-1 (Online)
Solms, S.H., Solms, Rossouw
1st Edition. 2nd Printing. 2008, XIV, 138p.
ISBN 978-0-387-79984-1
Immediately available per PDF-download (no DRM, watermarked)
About this book
- Provides a point of entry into the subject with an easy-to-understand model of Information Security Governance
- Addresses information security from the governance side with special emphasis on the accountability of top management
- Ideal for the professional market as it discusses some international best practices for IT Security Governance in detail
Key Features:
- The book provides a point of entry into the subject with an easy-to-understand model of Information Security Governance
- Book addresses information security from the governance side, with special emphasis on the accountability of top management
- Ideal for the professional market as it discusses some international best practices for IT Security Governance in detail
Table of contents An Introduction to Corporate Governance.- Information Technology Governance.- Information Security and Information Security Governance.- Introducing the Information Security Goverance Model.- The Use of Best Practice Standards and Guidelines in Information Security Governance.- The Direct Part of the Model- An Information Security Policy Architecture.- The Control Part of the Model - An Information Security Compliance Management Environment.- IT Risk Management.- Organizing the Information Security Function.- Information Security Education, Training, and Awareness.-A Methodology for Establishing an Information Security Governance Environment.-
- Reviews
From the reviews:
"The authors of this book are known to researchers in information technology security … . This book is a short introduction to information security governance. … The book gives managers a quick overview of what this term, ‘information security governance,’ is about and serves as a reference for managers. The book might also be useful for university courses that only touch on the subject, at an introductory level. … The book is well written, easy to read, and has clear benefits for the reader." (Edgar R. Weippl, ACM Computing Reviews, June, 2009)
Information Security Governance.pdf
(2.25 MB, 需要: 4 个论坛币)





雷达卡





京公网安备 11010802022788号







