IT governance : a manager's guide to data security and BS 7799/ISO 17799 / Alan Calder, Steve Watkins.
Material type:
TextPublication details: London ; Sterling, VA : Kogan Page, 2005.Edition: 3rd edDescription: xiv, 368 p. ; 25 cmISBN: - 0749444142 (hardback)
- 0749443944 (pbk.)
- QA76.9.A25 .C35
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Books
|
Methodist University Library Main General Stacks | Reference | QA76.9.A25 .C35 (Browse shelf(Opens below)) | Available | 34024 | |||||||||||||
Books
|
Methodist University Library Main General Stacks | Reference | QA76.9.A25 .C35 (Browse shelf(Opens below)) | Available | 34027 |
Browsing Methodist University Library Main shelves,Shelving location: General Stacks,Collection: Reference Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| QA76.9 .S88 .K45 Systems Analysis and Design | QA76.9 .U83 .T36 Novell's ZENworks administrator's handbook Author: Publisher: | QA76.9.A25 .Ab8 Information security : | QA76.9.A25 .C35 IT governance : | QA76.9.A25 .C35 IT governance : | QA76.9.A25 .Sh3 Anti-Hacker Tool Kit, Second Edition / | QA76.9.A25 .V9145 Computer forensics : |
Includes index
The information economy --
What is IT governance? --
Information security --
1. Why is information security necessary? --
2. The combined code, the Turnbull report and Sarbanes-Oxley --
3. BS 7799 --
4. Organizing information security --
5. Information security policy and scope --
6. The risk assessment and statement of applicability --
7. External parties --
8. Asset management --
9. Human resources security --
10. Physical and environmental security --
11. Equipment security --
12. Communications and operations management --
13. Controls against malicious software (malware) and back-ups
14. Network security management and media handling --
15. Exchanges of information.
16. Electronic commerce services
17. E-mail and Internet use.
18. Access control.
19. Network access control.
20. Operating system access control.
21. Application access control and teleworking
22. Systems development and maintenance.
23. Cryptographic controls.
24. Security in development and support process.
25. Monitoring and information security incident management
26. Business continuity management.
27. Compliance.
28. The BS7799 audit.
There are no comments on this title.