IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry.
Key Features:
Key Features:
- The book provides a point of entry into the subject with an easy-to-understand model of Information Security Governance
- Book addresses information security from the governance side, with special emphasis on the accountability of top management
- Ideal for the professional market as it discusses some international best practices for IT Security Governance in detail
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
From the reviews:
"The authors of this book are known to researchers in information technology security ... . This book is a short introduction to information security governance. ... The book gives managers a quick overview of what this term, 'information security governance,' is about and serves as a reference for managers. The book might also be useful for university courses that only touch on the subject, at an introductory level. ... The book is well written, easy to read, and has clear benefits for the reader." (Edgar R. Weippl, ACM Computing Reviews, June, 2009)
"The authors of this book are known to researchers in information technology security ... . This book is a short introduction to information security governance. ... The book gives managers a quick overview of what this term, 'information security governance,' is about and serves as a reference for managers. The book might also be useful for university courses that only touch on the subject, at an introductory level. ... The book is well written, easy to read, and has clear benefits for the reader." (Edgar R. Weippl, ACM Computing Reviews, June, 2009)