Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Resource Information
The instance Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in European University Institute Library. This resource is a combination of several types including: Instance, Electronic.
The Resource
Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Resource Information
The instance Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in European University Institute Library. This resource is a combination of several types including: Instance, Electronic.
- Label
- Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
- Title remainder
- from the boardroom to the keyboard
- Medium
- electronic resource
- Statement of responsibility
- Todd Fitzgerald
- Note
- An Auerbach book
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security strategy -- ch. 3. Defining the security management organization -- ch. 4. Interacting with the C-suite -- ch. 5. Managing risk to an acceptable level -- ch. 6. Creating effective information security policies -- ch. 7. Security compliance using control frameworks -- ch. 8. Managerial controls : practical security considerations -- ch. 9. Technical controls : practical security considerations -- ch. 10. Operational controls : practical security considerations -- ch. 11. The auditors have arrived, now what? -- ch. 12. Effective security communications -- ch. 13. The law and information security -- ch. 14. Learning from information security incidents -- ch. 15. 17 ways to dismantle information security governance efforts
- Control code
- 9780429131905
- Dimensions
- unknown
- Extent
- 1 online resource (xxviii, 403 pages)
- Form of item
- online
- Isbn
- 9781439811634
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1201/b11357
- Record ID
- u514073
- Specific material designation
- remote
- System control number
- (OCoLC)773298336
Context
Context of Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/Awb9UP1xowk/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/Awb9UP1xowk/">Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/Awb9UP1xowk/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/Awb9UP1xowk/">Information security governance simplified : from the boardroom to the keyboard, Todd Fitzgerald, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>