IT governance and information security guides, standards, and frameworks
IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms expose organiz...
Saved in:
| Main Authors: | Maleh, Yassine (Author), Sahid, Abdelkebir (Author), Alazab, Mamoun (Author), Belaissaoui, Mustapha (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press
2022
|
| Series: | Advances in cybersecurity management
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Information protection playbook
Published: (2013)
Published: (2013)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Improving information security practices through computational intelligence
Published: (2016)
Published: (2016)
Information Security Management Handbook
Published: (2012)
Published: (2012)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Published: (2009)
Published: (2009)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Critical infrastructure protection from cybersecurity to cyber resilience
Published: (2021)
Published: (2021)
Information security management handbook, 2008 CD-ROM edition
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Computer and intrusion forensics
Published: (2003)
Published: (2003)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Managing information security
Published: (2014)
Published: (2014)
Information storage and management storing. managing, and protecting digital information
Published: (2009)
Published: (2009)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbook
Published: (2012)
Published: (2012)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Digital identity management
Published: (2015)
Published: (2015)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Corporate governance an international perspective /
Published: (2008)
Published: (2008)
Corporate governance mechanisms and systems
by: Thomsen, Steen
by: Thomsen, Steen
Similar Items
-
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009) -
Principles of information security
by: Whitman, Michael E
Published: (2003) -
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019) -
Management of information security
by: Whitman
Published: (2004) -
Security in computing
by: Pfleegar, Charles P.
Published: (1997)


