无需Kindle设备,下载免费Kindle阅读软件,即可在您的手机、电脑及平板电脑上畅享阅读。

  • 点击此处下载Kindle iOS阅读软件
    iPhone/iPad/Mac
  • 点击此处下载Kindle Android阅读软件
    Android手机或平板电脑

请输入您的手机号码,获取Kindle阅读软件的下载链接。

kcpAppSendButton

购买选项

Kindle电子书价格: ¥403.82

这些促销将适用于该商品:

部分促销可以同时享受;部分促销不可与其他促销同时享受。更多详情请查看促销条款。

发送至您的Kindle设备或Kindle阅读软件

发送至您的Kindle设备或Kindle阅读软件

“Securing an IT Organization through Governance, Risk Management, and Audit (Internal Audit and IT Audit) (English Edition)”,作者:[Ken E. Sigler, James L. Rainey, III]

Securing an IT Organization through Governance, Risk Management, and Audit (Internal Audit and IT Audit) (English Edition) Kindle电子书

4.2 颗星,最多 5 颗星 5 星级
|
分享
广告
显示所有 格式和版本 隐藏其他格式和版本
亚马逊价格
全新品最低价 非全新品最低价
Kindle电子书
¥403.82

该系列中的图书(39 本书)

商品描述

目录

Cybersecurity Risk Management Cybersecurity Cybersecurity Risk Management Managing ICT Security Risk through Governance, Control, and Audit Implementing Best Practices Using a Single Cybersecurity Framework Chapter Summary Case Project Introduction to the Framework for Improving Critical Infrastructure Cybersecurity Overview of the Framework Framework Core Framework Implementation Tiers Framework Profile Framework Is Descriptive and Not Prescriptive Structure of the Book's Presentation of the Framework Chapter Summary Case Project Identify Function Identify Function Overview Asset Management Category Business Environment Category Governance Category Risk Assessment Category Risk Management Category Risk Management Plan Implementing Risk Management Risk Handling Strategies Linking COBIT to the Identify Function Chapter Summary Case Project Protect Function Protect Function Overview Access Control Category Awareness and Training Category Data Security Category Information Protection Processes and Procedures Category Maintenance Protective Technology Linking COBIT to the Protect Function Chapter Summary Case Project Detect Function Detect Function Overview Anomalies and Events Category Security Continuous Monitoring Category Detection Processes Category Chapter Summary Case Project Respond Function Respond Function Overview Response Planning Category Communications Category Analysis Category Mitigation Category Improvement Category Chapter Summary Case Project Recover Function Distinguishing between Business Continuity and Disaster Recovery Improvement Category Communications Category Chapter Summary Case Project The COBIT Framework Assumptions IT Governance Framework Model Practical Technical Scenarios (PTSs) What Drives COBIT 5 Framework Principles Other Governance Frameworks and Best Practices Case Project Decomposition of Framework Framework Principles: Creation Definition of Categories and Seven Enablers Control Issue Navigation Issue Case Project Framework Structure's Generic Domains COBIT's Framework Structure Planning and Organization Acquisition and Implementation Delivery and Support Monitoring Case Project Decomposition of COBIT 5 Purpose of COBIT Control Objectives and Principles Principle 1: Installing the Integrated IT Architectural Framework Principle 2: What Do Stakeholders Value? Principle 3: The Business Context Focus Principle 4: Managing Risk Principle 5: Measuring Performance Case Project COBIT Management Guidelines Enterprise Management Risk Management Status of IT Systems Continuous Improvement Case Project COBIT Management Dashboard Performance Measurement IT Control Profiling Awareness Benchmarking Case Project What COBIT Sets Out to Accomplish Adaptability to Existing Frameworks Constituency of Governance for Finance Constituency of Governance for IT Case Project Internal Audits Purpose of Internal Audits Roles That Potentially Use COBIT Approaches to Using COBIT in an Internal Audit Types of Audits Which Can Be Facilitated Using COBIT Advantages of Using COBIT in Internal Audits Case Project Tying It All Together COBIT Works with Sarbanes-Oxley (SOx) COBIT Works with GETIT Process Assessment Model (PAM) Case Project References --此文字指其他 kindle_edition 版本。

作者简介

Ken Sigler is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills Michigan campus of Oakland Community College and the chair of the Campus Senate. His primary research is in the area of software management, software assurance, and cybersecurity. He has authored several books on the topic of cybersecurity ICT management and developed the college's CIS program option Information Technologies for Homeland Security, which has a recognized relationship with the Committee on National Security Systems. Sigler serves as the liaison for the college as one of three founding members of the International Cybersecurity Education Coalition (ICSEC), which is now the Midwest chapter for CISSE. James L. Rainey, III, DMIT, is an IT specialist with the U.S. government where he works on technical project documentation within the SDLC. Dr. Rainey holds an MS degree in computer and information systems and did a tour with the Department of Defense where he earned a citation for his work. Dr. Rainey has also worked as a UNIX system administrator, SAP basis administrator, and enterprise and infrastructure architect. Additionally, he worked at Comerica Bank's Data Center in Auburn Hills, Michigan, as a developer and taught at the University of Detroit Mercy's Computer and Information Systems Department for 10 years as an adjunct. --此文字指其他 kindle_edition 版本。

基本信息

  • ASIN : B0185JFYNK
  • 出版社 : Auerbach Publications; 第 1st 版 (2016年1月5日)
  • 出版日期 : 2016年1月5日
  • 语言 : 英语
  • 文件大小 : 16758 KB
  • 标准语音朗读 : 未启用
  • X-Ray : 未启用
  • 生词提示功能 : 未启用
  • 纸书页数 : 396页
  • 用户评分:
    4.2 颗星,最多 5 颗星 5 星级
click to open popover

无顾客评论

5 星 (0%) 0%
4 星 (0%) 0%
3 星 (0%) 0%
2 星 (0%) 0%
1 星 (0%) 0%
评级是如何计算的?

评论该商品

与其他买家分享您的想法

此商品在美国亚马逊上最有用的商品评论

美国亚马逊: 3.8 颗星,最多 5 颗星 3 条评论
DJP
2.0 颗星,最多 5 颗星 Disappointing PDF conversion of what is already online from other resources.
2016年6月4日 - 已在美国亚马逊上发表
已确认购买
1 个人发现此评论有用
Bill
5.0 颗星,最多 5 颗星 Highly recommend
2020年1月2日 - 已在美国亚马逊上发表
已确认购买
Craig M.
4.0 颗星,最多 5 颗星 Four Stars
2016年4月12日 - 已在美国亚马逊上发表
已确认购买