Normal view MARC view ISBD view

Securing an IT Organization through Governance, Risk Management, and Audit.

By: Sigler, Ken E.
Contributor(s): Rainey, III, James L.
Material type: TextTextSeries: eBooks on Demand.Internal Audit and IT Audit: Publisher: Boca Raton : CRC Press, 2016Description: 1 online resource (364 p.).ISBN: 9781498737326.Genre/Form: Electronic books.Additional physical formats: Print version:: Securing an IT Organization through Governance, Risk Management, and AuditDDC classification: 658.478 LOC classification: T58.5Online resources: Click here to view this ebook.
Contents:
Front Cover -- Contents -- Foreword -- Preface -- Acknowledgments -- Authors -- Organization of the Text -- Chapter 1: Cybersecurity Risk Management -- Chapter 2: Introduction to the Framework for Improving Critical Infrastructure Cybersecurity -- Chapter 3: Identify Function -- Chapter 4: Protect Function -- Chapter 5: Detect Function -- Chapter 6: Respond Function -- Chapter 7: Recover Function -- Chapter 8: The COBIT Framework -- Chapter 9: Decomposition of Framework -- Chapter 10: Framework Structure's Generic Domains -- Chapter 11: Decomposition of COBIT 5 Principles
Chapter 12: COBIT Management Guidelines -- Chapter 13: COBIT Management Dashboard -- Chapter 14: What COBIT Sets Out to Accomplish -- Chapter 15: Internal Audits -- Chapter 16: Tying It All Together -- Bibliography -- Back Cover
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
T58.5 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=4097042 Available EBL4097042

Front Cover -- Contents -- Foreword -- Preface -- Acknowledgments -- Authors -- Organization of the Text -- Chapter 1: Cybersecurity Risk Management -- Chapter 2: Introduction to the Framework for Improving Critical Infrastructure Cybersecurity -- Chapter 3: Identify Function -- Chapter 4: Protect Function -- Chapter 5: Detect Function -- Chapter 6: Respond Function -- Chapter 7: Recover Function -- Chapter 8: The COBIT Framework -- Chapter 9: Decomposition of Framework -- Chapter 10: Framework Structure's Generic Domains -- Chapter 11: Decomposition of COBIT 5 Principles

Chapter 12: COBIT Management Guidelines -- Chapter 13: COBIT Management Dashboard -- Chapter 14: What COBIT Sets Out to Accomplish -- Chapter 15: Internal Audits -- Chapter 16: Tying It All Together -- Bibliography -- Back Cover

Description based upon print version of record.

Author notes provided by Syndetics

<p>Ken Sigler is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills Michigan campus of Oakland Community College and the chair of the Campus Senate. His primary research is in the area of software management, software assurance, and cybersecurity. He has authored several books on the topic of cybersecurity ICT management and developed the college's CIS program option Information Technologies for Homeland Security, which has a recognized relationship with the Committee on National Security Systems. Sigler serves as the liaison for the college as one of three founding members of the International Cybersecurity Education Coalition (ICSEC), which is now the Midwest chapter for CISSE.</p> <p> James L. Rainey, III, DMIT, is an IT specialist with the U.S. government where he works on technical project documentation within the SDLC. Dr. Rainey holds an MS degree in computer and information systems and did a tour with the Department of Defense where he earned a citation for his work. Dr. Rainey has also worked as a UNIX system administrator, SAP basis administrator, and enterprise and infrastructure architect. Additionally, he worked at Comerica Bank's Data Center in Auburn Hills, Michigan, as a developer and taught at the University of Detroit Mercy's Computer and Information Systems Department for 10 years as an adjunct.</p>

There are no comments for this item.

Log in to your account to post a comment.