|
|
|
|
LEADER |
03064pam a22004571i 4500 |
001 |
180-020341477 |
003 |
Uk |
005 |
20211225020458.0 |
006 |
m || d | |
007 |
cr ||||||||||| |
008 |
210915s2021 flua o 000|0|eng|d |
015 |
|
|
|a GBC1G2506
|2 bnb
|
020 |
|
|
|a 9781000478969 (ePub ebook) :
|c £56.99
|
020 |
|
|
|z 9780367753245 (hbk.) :
|c £56.99
|
020 |
|
|
|a 9781000478914 (PDF ebook) :
|c £56.99
|
020 |
|
|
|a 9781003161998 (ebook) :
|c £56.99
|
024 |
7 |
|
|a 10.1201/9781003161998
|2 doi
|
037 |
|
|
|a 9781000478969
|b Ingram Content Group
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|d Uk
|e rda
|e pn
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Maleh, Yassine
|d 1987-
|e author.
|
245 |
1 |
0 |
|a IT governance and information security
|b guides, standards and frameworks
|c Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui
|
250 |
|
|
|a 1st
|
264 |
|
1 |
|a Boca Raton
|b CRC Press
|c 2021
|
300 |
|
|
|a 1 online resource :
|b illustrations (black and white).
|
336 |
|
|
|a text
|2 rdacontent
|
336 |
|
|
|a still image
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
0 |
|
|a Advances in cybersecurity management
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
505 |
0 |
|
|a <p><b> </b></p><p><b>Preface</b></p><p><b>Acknowledgment</b></p><p><b>Introduction</b></p><p><b>Section 1: </b></p><p><b>IT Governance: Definitions and Standards</b></p><p><b> </b></p><p><b>Chapter 1</b></p><p>Information System and IT Governance Evolution</p><p> </p><p><b>Chapter 2</b></p><p>IT Governance and Information Security: Guides and Standards</p><p><i><br> <br> </i></p><p><b>Section 2: </b></p><p><b>Maturity Frameworks for Information Technology Governance </b></p><p> </p><p><b>Chapter 3</b></p><p>IT Governance IT Governance in Organizations: A Maturity Framework based on COBIT 5</p><p> </p><p><b>Chapter 4</b></p><p>IT Service Management as a key pillar for IT Governance: A Maturity Framework based on ITILv4<br> <br> <b>Chapter 5</b></p><p>Cloud Computing as a key pillar for Agile IT Governance</p><p> </p><p><b>Section 3: </b></p><p><b>Maturity Frameworks for Information Security Governance </b></p><p><b> </b></p><p><b>Chapter 6</b></p><p>Information Security Governance: Best practices in organizations<br> <br> <b>Chapter 7</b></p><p>Information Security Governance: A maturity framework based on ISO/IEC 27001</p><p><br> <b>Chapter 8</b></p><p>Information Security Policy: A Maturity Framework based on ISO/IEC 27002</p><p><i> </i></p><p><b>Conclusion</b></p><p><b>Compilation of References</b></p><p><b>Acronyms</b></p><p><b>About the Authors</b></p><p><b>Index</b></p><p> </p>
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
700 |
1 |
|
|a Sahid, Abdelkebir
|d 1983-
|e author.
|
700 |
1 |
|
|a Alazab, Mamoun
|d 1980-
|e author.
|
700 |
1 |
|
|a Belaissaoui, Mustapha
|d 1968-
|e author.
|
776 |
0 |
8 |
|i Print version :
|z 9780367753245
|
859 |
|
|
|a ELD
|b ebook
|
980 |
|
|
|a 020341477
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1778756561100865536 |
access_facet |
Electronic Resources |
author |
Maleh, Yassine, Sahid, Abdelkebir, Alazab, Mamoun, Belaissaoui, Mustapha |
author_facet |
Maleh, Yassine, Sahid, Abdelkebir, Alazab, Mamoun, Belaissaoui, Mustapha |
author_role |
aut, aut, aut, aut |
author_sort |
Maleh, Yassine 1987- |
author_variant |
y m ym, a s as, m a ma, m b mb |
building |
Library A |
callnumber-sort |
|
collection |
sid-180-col-bnbfidbbi |
contents |
<p><b> </b></p><p><b>Preface</b></p><p><b>Acknowledgment</b></p><p><b>Introduction</b></p><p><b>Section 1: </b></p><p><b>IT Governance: Definitions and Standards</b></p><p><b> </b></p><p><b>Chapter 1</b></p><p>Information System and IT Governance Evolution</p><p> </p><p><b>Chapter 2</b></p><p>IT Governance and Information Security: Guides and Standards</p><p><i><br> <br> </i></p><p><b>Section 2: </b></p><p><b>Maturity Frameworks for Information Technology Governance </b></p><p> </p><p><b>Chapter 3</b></p><p>IT Governance IT Governance in Organizations: A Maturity Framework based on COBIT 5</p><p> </p><p><b>Chapter 4</b></p><p>IT Service Management as a key pillar for IT Governance: A Maturity Framework based on ITILv4<br> <br> <b>Chapter 5</b></p><p>Cloud Computing as a key pillar for Agile IT Governance</p><p> </p><p><b>Section 3: </b></p><p><b>Maturity Frameworks for Information Security Governance </b></p><p><b> </b></p><p><b>Chapter 6</b></p><p>Information Security Governance: Best practices in organizations<br> <br> <b>Chapter 7</b></p><p>Information Security Governance: A maturity framework based on ISO/IEC 27001</p><p><br> <b>Chapter 8</b></p><p>Information Security Policy: A Maturity Framework based on ISO/IEC 27002</p><p><i> </i></p><p><b>Conclusion</b></p><p><b>Compilation of References</b></p><p><b>Acronyms</b></p><p><b>About the Authors</b></p><p><b>Index</b></p><p> </p> |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
doi_str_mv |
10.1201/9781003161998 |
edition |
1st |
facet_avail |
Online |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-020341477 |
illustrated |
Illustrated |
imprint |
Boca Raton, CRC Press, 2021 |
imprint_str_mv |
Boca Raton CRC Press 2021 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781000478969 (ePub ebook) :, 9781000478914 (PDF ebook) :, 9781003161998 (ebook) : |
isbn_isn_mv |
9780367753245 (hbk.) :, 9780367753245 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:34:06.896Z |
marc024a_ct_mv |
10.1201/9781003161998 |
match_str |
maleh2021itgovernanceandinformationsecurityguidesstandardsandframeworks |
mega_collection |
British National Bibliography |
physical |
1 online resource; illustrations (black and white) |
publishDate |
2021 |
publishDateSort |
2021 |
publishPlace |
Boca Raton |
publisher |
CRC Press |
record_format |
marcfinc |
record_id |
020341477 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
series2 |
Advances in cybersecurity management |
source_id |
180 |
spelling |
Maleh, Yassine 1987- author., IT governance and information security guides, standards and frameworks Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui, 1st, Boca Raton CRC Press 2021, 1 online resource : illustrations (black and white)., text rdacontent, still image rdacontent, computer rdamedia, online resource rdacarrier, Advances in cybersecurity management, Description based on CIP data; resource not viewed., <p><b> </b></p><p><b>Preface</b></p><p><b>Acknowledgment</b></p><p><b>Introduction</b></p><p><b>Section 1: </b></p><p><b>IT Governance: Definitions and Standards</b></p><p><b> </b></p><p><b>Chapter 1</b></p><p>Information System and IT Governance Evolution</p><p> </p><p><b>Chapter 2</b></p><p>IT Governance and Information Security: Guides and Standards</p><p><i><br> <br> </i></p><p><b>Section 2: </b></p><p><b>Maturity Frameworks for Information Technology Governance </b></p><p> </p><p><b>Chapter 3</b></p><p>IT Governance IT Governance in Organizations: A Maturity Framework based on COBIT 5</p><p> </p><p><b>Chapter 4</b></p><p>IT Service Management as a key pillar for IT Governance: A Maturity Framework based on ITILv4<br> <br> <b>Chapter 5</b></p><p>Cloud Computing as a key pillar for Agile IT Governance</p><p> </p><p><b>Section 3: </b></p><p><b>Maturity Frameworks for Information Security Governance </b></p><p><b> </b></p><p><b>Chapter 6</b></p><p>Information Security Governance: Best practices in organizations<br> <br> <b>Chapter 7</b></p><p>Information Security Governance: A maturity framework based on ISO/IEC 27001</p><p><br> <b>Chapter 8</b></p><p>Information Security Policy: A Maturity Framework based on ISO/IEC 27002</p><p><i> </i></p><p><b>Conclusion</b></p><p><b>Compilation of References</b></p><p><b>Acronyms</b></p><p><b>About the Authors</b></p><p><b>Index</b></p><p> </p>, Computer security., Data protection., Sahid, Abdelkebir 1983- author., Alazab, Mamoun 1980- author., Belaissaoui, Mustapha 1968- author., Print version : 9780367753245, ELD ebook |
spellingShingle |
Maleh, Yassine, Sahid, Abdelkebir, Alazab, Mamoun, Belaissaoui, Mustapha, IT governance and information security: guides, standards and frameworks, <p><b> </b></p><p><b>Preface</b></p><p><b>Acknowledgment</b></p><p><b>Introduction</b></p><p><b>Section 1: </b></p><p><b>IT Governance: Definitions and Standards</b></p><p><b> </b></p><p><b>Chapter 1</b></p><p>Information System and IT Governance Evolution</p><p> </p><p><b>Chapter 2</b></p><p>IT Governance and Information Security: Guides and Standards</p><p><i><br> <br> </i></p><p><b>Section 2: </b></p><p><b>Maturity Frameworks for Information Technology Governance </b></p><p> </p><p><b>Chapter 3</b></p><p>IT Governance IT Governance in Organizations: A Maturity Framework based on COBIT 5</p><p> </p><p><b>Chapter 4</b></p><p>IT Service Management as a key pillar for IT Governance: A Maturity Framework based on ITILv4<br> <br> <b>Chapter 5</b></p><p>Cloud Computing as a key pillar for Agile IT Governance</p><p> </p><p><b>Section 3: </b></p><p><b>Maturity Frameworks for Information Security Governance </b></p><p><b> </b></p><p><b>Chapter 6</b></p><p>Information Security Governance: Best practices in organizations<br> <br> <b>Chapter 7</b></p><p>Information Security Governance: A maturity framework based on ISO/IEC 27001</p><p><br> <b>Chapter 8</b></p><p>Information Security Policy: A Maturity Framework based on ISO/IEC 27002</p><p><i> </i></p><p><b>Conclusion</b></p><p><b>Compilation of References</b></p><p><b>Acronyms</b></p><p><b>About the Authors</b></p><p><b>Index</b></p><p> </p>, Computer security., Data protection. |
title |
IT governance and information security: guides, standards and frameworks |
title_auth |
IT governance and information security guides, standards and frameworks |
title_full |
IT governance and information security guides, standards and frameworks Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui |
title_fullStr |
IT governance and information security guides, standards and frameworks Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui |
title_full_unstemmed |
IT governance and information security guides, standards and frameworks Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui |
title_short |
IT governance and information security |
title_sort |
it governance and information security guides standards and frameworks |
title_sub |
guides, standards and frameworks |
topic |
Computer security., Data protection. |
topic_facet |
Computer security., Data protection. |