LDR | | 03642cmm uu200589Ka 4500 |
001 | | 000000300919 |
003 | | OCoLC |
005 | | 20230519141953 |
006 | | m o d |
007 | | cr cnu---unuuu |
008 | | 120820s2013 pau ob 001 0 eng d |
019 | |
▼a 844971483 |
020 | |
▼a 9781466620841 (electronic bk.) |
020 | |
▼a 1466620846 (electronic bk.) |
020 | |
▼z 9781466620834 |
020 | |
▼z 1466620838 |
020 | |
▼z 9781466620858 |
020 | |
▼z 1466620854 |
029 | 1 |
▼a NZ1
▼b 14694693 |
035 | |
▼a (OCoLC)806953201 |
037 | |
▼a CL0500000218
▼b Safari Books Online |
040 | |
▼a N$T
▼c N$T
▼d E7B
▼d OCLCQ
▼d CDX
▼d UIU
▼d OCLCQ
▼d RRP
▼d UMI
▼d 248032 |
049 | |
▼a K4RA |
050 | 4 |
▼a QA76.9.A25
▼b I894 2013eb |
072 | 7 |
▼a COM
▼x 060040
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 043050
▼2 bisacsh |
072 | 7 |
▼a COM
▼x 053000
▼2 bisacsh |
082 | 04 |
▼a 005.8
▼2 23 |
245 | 00 |
▼a IT security governance innovations
▼h [electronic resource] :
▼b theory and research /
▼c Daniel Mellado ... [et al.], editors. |
260 | |
▼a Hershey, Pa. :
▼b Information Science Reference,
▼c 2013. |
300 | |
▼a 1 online resource. |
504 | |
▼a Includes bibliographical references and index. |
505 | 0 |
▼a Overview of key information security governance frameworks / Oscar Rebollo -- IT security governance in e-banking / Theodosios Tsiakis, Theodoros Kargidis, Aristeidis Chatzipoulidis -- IT security governance legal issues / Gemma Mari?a Minero Alejandre -- Information technology service management / Magdalena Arcilla ... [et al.] -- Assessing the maturity of control objectives for information and related technology (COBIT) framework in the Egyptian banking sector / Hisham M. Abdelsalam, Ahmed M Marzouk, Haitham S. Hamza -- Adoption of ISO 27001 in Cyprus enterprises: current state and challenges / Ioanna Dionysiou ... [et al.] -- An information governance model for information security management / Matthew Nicho -- Information security governance using biometrics / Shrikant Tiwari, Sanjay Kumar Singh -- Ontology based multi agent modelling for information security measurement / Partha Saha, Ambuj Mahanti -- Using indicators to monitor security risk in systems of systems: how to capture and measure the impact of service dependencies on the security of provided services / Olav Skjelkva?le Ligaarden, Atle Refsdal, Ketil St첩len -- Information security governance: the art of detecting hidden malware / Mamoun Alazab ... [et al.]. |
520 | |
▼a "This book provides extraordinary research that highlights the main contributions and characteristics of existing approaches, standards, best practices and new trends in IT Security Governance"--Provided by publisher. |
588 | |
▼a Description based on print version record. |
650 | 0 |
▼a Computer security
▼x Management. |
650 | 0 |
▼a Information technology
▼x Security measures. |
650 | 0 |
▼a Business enterprises
▼x Security measures. |
650 | 0 |
▼a Data protection. |
650 | 7 |
▼a COMPUTERS / Internet / Security.
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Networking / Security.
▼2 bisacsh |
650 | 7 |
▼a COMPUTERS / Security / General.
▼2 bisacsh |
655 | 4 |
▼a Electronic books. |
655 | 0 |
▼a Electronic books. |
700 | 1 |
▼a Mellado, Daniel,
▼d 1980- |
776 | 08 |
▼i Print version:
▼t IT security governance innovations.
▼d Hershey, PA : Information Science Reference, 2013
▼z 9781466620834
▼w (DLC) 2012014224
▼w (OCoLC)792888749 |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=475691 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 475691 |
938 | |
▼a Coutts Information Services
▼b COUT
▼n 24015659 |
938 | |
▼a ebrary
▼b EBRY
▼n ebr10594351 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b K4R |