IT Compliance and Controls Best Practices for Implementation
IT Compliance and Controlsoffers a structured architectural approach, a 'blueprint in effect,' for new and seasoned executives and business professionals alike to understand the world of compliance?from the perspective of what the problems are, where they come from, and how to position you...
Saved in:
Main Author | |
---|---|
Format | eBook |
Language | English |
Published |
Newark
Wiley
2008
WILEY John Wiley & Sons, Incorporated Wiley-Blackwell John Wiley & Sons |
Edition | 1. Aufl. |
Subjects | |
Online Access | Get full text |
ISBN | 9780470145012 0470145013 9780470245453 047024545X |
Cover
Abstract | IT Compliance and Controlsoffers a structured architectural approach, a 'blueprint in effect,' for new and seasoned executives and business professionals alike to understand the world of compliance?from the perspective of what the problems are, where they come from, and how to position your company to deal with them today and into the future. |
---|---|
AbstractList | IT Compliance and Controls offers a structured architectural approach, a 'blueprint in effect,' for new and seasoned executives and business professionals alike to understand the world of compliance?from the perspective of what the problems are, where they come from, and how to position your company to deal with them today and into the future. IT Compliance and Controlsoffers a structured architectural approach, a 'blueprint in effect,' for new and seasoned executives and business professionals alike to understand the world of compliance?from the perspective of what the problems are, where they come from, and how to position your company to deal with them today and into the future. |
Author | DeLuccia, James J |
Author_xml | – sequence: 1 fullname: DeLuccia, James J |
BookMark | eNpVkF1LwzAYhSN-4Jz7A14NEcGLQZrvXroydTDwZvhxFdI22Wqzpjbd1H9vto6J783LCQ_nvDkX4KRylT4CF5BwiAgl9O0YDGIutjoiFEboDPQI5ig8cH4OBt5_wO1wSmPRA1fT-TBxq9oWqsr0UFV5kFXbOOsvwalR1uvBfvfBy8NknjyNZs-P0-R-NlKMIUxHLCRjQTWNDcIRhZkyApoo19pkBLNIQ6GwMpEWkMUZRwExiDDN4zQ3KWS4D247Y18W1npnWpk6V3pEvrlMSx-uRQTTKIB3Hah8qb_80tnWy43VO1ruf71rAQf2Zm-qjGqKzlFukPxXzl923bjPtfat3LllOnSgrJyME4wpD_GH7GJRr1Nb-GVRLWTdFCvV_MjX6WzyPg6HEsq2ptcdm4VWc3egOkkEQyLGvyAwfRM |
ContentType | eBook |
DBID | 08O WIIVT OHILO OODEK |
DEWEY | 004.068 |
DatabaseName | ciando eBooks Wiley O'Reilly Online Learning: Corporate Edition O'Reilly Online Learning: Academic/Public Library Edition |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Business Computer Science |
EISBN | 047024545X 9780470245453 9780470145012 0470145013 |
Edition | 1. Aufl. 1 |
ExternalDocumentID | bks00024351 9780470245453 9780470145012 EBC335724 WILEYB0004562 ciando486289 |
Genre | Electronic books |
GroupedDBID | 089 08O 20A 38. 3XM 5VX A4I A4J AABBV AALIM ABARN ABIAV ABQPQ ABQPW ABYOB ACLGV ACNAM ADNEN ADVEM AERYV AFOJC AHWGJ AIXPE AJFER AKHYG ALMA_UNASSIGNED_HOLDINGS AUKZS AZZ BBABE BPBUR CZZ GEOUK HF4 HZKEI IVN J-X JFSCD JJU KGVDC MYL NK1 NK2 OHILO OODEK OTAXI OV6 PQQKQ W1A WIIVT WZT YPLAZ ZEEST -VQ -VX 6XM AHCZW DRU IVK IWL XI1 |
ID | FETCH-LOGICAL-a66235-6702385e59f23150caf80f1deefc4361e08a3af1e8069c72150f246e79bdfb063 |
ISBN | 9780470145012 0470145013 9780470245453 047024545X |
IngestDate | Fri Apr 04 11:29:03 EDT 2025 Thu Feb 27 10:20:07 EST 2025 Fri Sep 05 23:43:23 EDT 2025 Wed Sep 10 03:54:07 EDT 2025 Fri Aug 29 02:55:11 EDT 2025 Fri Aug 15 18:52:20 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Keywords | Wirtschaft Management Planung Wirtschaft Organisation |
LCCallNum | HD30.2 .D456 2008eb |
LCCallNum_Ident | HD30.2.D456 2008 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a66235-6702385e59f23150caf80f1deefc4361e08a3af1e8069c72150f246e79bdfb063 |
Notes | Available also in a print ed. Mode of access: Internet via World Wide Web. Title from title screen. |
OCLC | 437204777 |
PQID | EBC335724 |
PageCount | 291 |
ParticipantIDs | skillsoft_books24x7_bks00024351 askewsholts_vlebooks_9780470245453 safari_books_v2_9780470145012 proquest_ebookcentral_EBC335724 igpublishing_primary_WILEYB0004562 ciando_primary_ciando486289 |
ProviderPackageCode | J-X |
PublicationCentury | 2000 |
PublicationDate | 2008 2008. 2008-04-04T00:00:00 2008-06-13 c2008 |
PublicationDateYYYYMMDD | 2008-01-01 2008-04-04 2008-06-13 |
PublicationDate_xml | – year: 2008 text: 2008 |
PublicationDecade | 2000 |
PublicationPlace | Newark |
PublicationPlace_xml | – name: Newark – name: Hoboken, N.J |
PublicationYear | 2008 |
Publisher | Wiley WILEY John Wiley & Sons, Incorporated Wiley-Blackwell John Wiley & Sons |
Publisher_xml | – name: Wiley – name: WILEY – name: John Wiley & Sons, Incorporated – name: Wiley-Blackwell – name: John Wiley & Sons |
SSID | ssj0000075598 ssib002880242 ssib011230724 ssib013453086 |
Score | 1.8169649 |
Snippet | IT Compliance and Controlsoffers a structured architectural approach, a 'blueprint in effect,' for new and seasoned executives and business professionals alike... IT Compliance and Controls offers a structured architectural approach, a 'blueprint in effect,' for new and seasoned executives and business professionals... |
SourceID | skillsoft askewsholts safari proquest igpublishing ciando |
SourceType | Aggregation Database Publisher |
SubjectTerms | Business & Economics Computer networks Information technology Infrastructure Management Security measures |
SubjectTermsDisplay | Business & Economics Computer networks -- Security measures. Computer networks -- Standards. Electronic books. Information technology -- Management. Infrastructure |
Subtitle | Best Practices for Implementation |
TableOfContents | IT compliance and controls : best practices for implementation -- Contents -- Preface -- Acknowledgments -- Part 1: Coming of Age -- Chapter 1: Operating in an Interconnected Universe -- Chapter 2: How Technology Enables the World Market -- Chapter 3: Importance of IT Controls -- Part 2: Influence and Effects -- Chapter 4: Death of Siloed IT Strategy -- Chapter 5: A Regulated Environment -- Chapter 6: The World Is Your Oyster of Resources and Guidance -- Chapter 7: Reality and Risks to IT Controls Being Effective -- Part 3: Implementation -- Chapter 8: Enterprise Risk Analysis -- Chapter 9: Principle 1: Strategy Orchestration -- Chapter 10: Principle 2: Life-Cycle Management -- Chapter 11: Principle 3: Access and Authorization -- Chapter 12: Principle 4: Sustain Operations -- Chapter 13: Principle 5: Security and Assurance -- Part 4: Looking Forward -- Chapter 14: This is Not the End -- Chapter 15: Building a System of IT Compliance and Controls -- Supportive Publications -- List of Acronyms -- Index Intro -- IT COMPLIANCE AND CONTROLS: Best Practices for Implementation -- Contents -- Preface -- Acknowledgments -- Part 1: COMING OF AGE -- Chapter 1: Operating in an Interconnected Universe -- THE INTEGRATED UNIVERSE -- GLOBALIZATION -- EMERGING MARKETS: IMPACTS OF INDIA AND CHINA -- INTEGRATION -- SEAMLESS SUPPLY CHAINS -- GOVERNMENTS GONE WILD -- GLOBAL CITIZENRY -- SUPERSIZED CHALLENGES -- SUMMARY -- ENDNOTES -- Chapter 2: How Technology Enables the World Market -- PROCESS IMPROVEMENTS -- COLLABORATION ENHANCEMENTS -- PROGRESSION OF NETWORKS AND DATA -- MIRACLE OF CONNECTIVITY -- ENDNOTES -- Chapter 3: Importance of IT Controls -- VALUE: BEYOND "BECAUSE IT IS BEST" -- INFORMATION SECURITY -- INFORMATION ASSURANCE -- VALUE BEYOND REGULATORY MANDATES -- IN THE END -- ENDNOTES -- Part 2: INFLUENCE AND EFFECTS -- Chapter 4: Death of Siloed IT Strategy -- IT CONTROLS PERMEATE BUSINESS OPERATIONS -- AGILE TECHNOLOGY CONTROLS -- BALANCING BUSINESS OBJECTIVES -- ACTION STEPS -- ENDNOTES -- Chapter 5: A Regulated Environment -- DEFINITION OF INTERNAL CONTROL -- REGULATORY ACTIVITY AND INTERNAL CONTROLS -- GLOBALIZATION OF REGULATIONS -- CREDIT CARD INDUSTRY -- THE ENERGY SECTOR -- FINANCIAL INDUSTRY -- LONGEVITY OF MANDATES -- ENDNOTES -- Chapter 6: The World Is Your Oyster of Resources and Guidance -- A WORLD OF RESOURCES AND GUIDANCE -- SUMMARY -- ENDNOTES -- Chapter 7: Reality and Risks to IT Controls Being Effective -- OVERVIEW -- PERCEPTION BIAS -- INHERENT CONTROL WEAKNESSES -- PERSPECTIVES OF MANAGEMENT, AUDIT, AND IT -- ENDNOTES -- Part 3: IMPLEMENTATION -- Chapter 8: Enterprise Risk Analysis -- IDENTIFYING RISK-BASED CONTROLS -- CONVERGE MANDATES -- RISK-BASED CONTROLS: FILTER AND PRIORITIZE -- RISK-BASED CONTROLS: CURRENT STATE -- ENDNOTES -- Chapter 9: Principle 1: Strategy Orchestration -- PRINCIPLES OVERVIEW: CONCEPT AND APPROACH GLOBAL PRINCIPLES -- PRINCIPLE 1: TECHNOLOGY STRATEGY ORCHESTRATION -- ENDNOTES -- Chapter 10: Principle 2: Life-Cycle Management -- OVERVIEW -- ACQUIRE AND SUPPORT -- APPLICATION CONTROLS: CORRECT PROCESSING -- SOFTWARE DEVELOPMENT -- CHANGE CONTROL -- COMPLIANCE -- ENDNOTES -- Chapter 11: Principle 3: Access and Authorization -- OVERVIEW -- LOGICAL ACCESS -- PHYSICAL ACCESS -- HUMAN RESOURCES -- COMPLIANCE -- ENDNOTES -- Chapter 12: Principle 4: Sustain Operations -- OVERVIEW -- OPERATIONS RESILIENCY -- ENVIRONMENTAL SAFEGUARDS -- COMPLIANCE -- ENDNOTES -- Chapter 13: Principle 5: Security and Assurance -- OVERVIEW -- RISK AWARENESS -- TRUSTED COMPUTING PLATFORM/SYSTEM CONTROLS -- TRUSTED COMMUNICATIONS AND NETWORK -- MONITORING AND PERFORMANCE REVIEWS -- INCIDENT RESPONSE CAPABILITY -- COMPLIANCE -- MONITORING AND PERFORMANCE REVIEWS -- INCIDENT RESPONSE CAPABILITY -- ENDNOTES -- Part 4: LOOKING FORWARD -- Chapter 14: This is Not the End -- BRINGING IT ALL TOGETHER -- FIVE PRINCIPLES -- REFLECTION ON INFORMATION TECHNOLOGY INTERNAL CONTROLS -- ENDNOTES -- Chapter 15: Building a System of IT Compliance and Controls -- GETTING STARTED -- PITFALLS -- OPPORTUNITIES -- OBJECTS IN MIRROR ARE CLOSER THAN THEY APPEAR -- OPTIMIZATION -- LONGEVITY AND VITALITY: THE NEXT 100 YEARS -- FINAL THOUGHTS -- ENDNOTE -- Supportive Publications -- List of Acronyms -- Index |
Title | IT Compliance and Controls |
URI | http://ebooks.ciando.com/book/index.cfm/bok_id/486289 http://portal.igpublish.com/iglibrary/search/WILEYB0004562.html https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=335724 https://learning.oreilly.com/library/view/~/9780470145012/?ar https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780470245453&uid=none http://www.books24x7.com/marc.asp?bookid=24351 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swEL_xIcH6NDYQhTEqxGsnJ3bi-JWqE0wbvHQTb5bj2AhatYi0CPHXc06cLzRNgpcosRLndBfbvzvf_QJwaqnikUInx1ihhszSeCisxnGlglRnWcxMERr4fRmf_2E_r6PrtQ93rayl1TL9rp__WVfyHqtiG9rVVcm-wbJ1p9iA52hfPKKF8fgK_NaXPvF8UgxkF6LwCf-jMuW8-U28-bXSupUJ6_d_Kgc_eeXgF7NDx-sjjLvNQOLzjzsc0iS56jYWS5ULkGQLht5LItZhnXN0Uzdx3Rs3kY0QB3LIaqiDMAxHf8PkHlAWUeKp5krXgjtu96LI34tDK0KjSrwe9FQ-xckaJ_Jljmt8KYdjhb25r6NsXWyfK6sebnuwnU9vZ7Mc16LWej_5BJvGFYHswJqZf4atqjrgCxxcTAaN5gf4nkGl-V34-2M8GZ0P_e8lhipG0OdqLhxgiUwkLKLciGhlE2KDzBirGY0DQxJFlQ1MQmKh0VWOiA1ZbLhIM5sittuDjflibvZhkITcIPLUQqSaZVkgOEJbq_GJwDpKxz6ctDQhH2fFVnguvbpChkCW9uGwVJC8L5lGZNtu2EVba_U9Bff6mfdl-3Bc6VIWr_ApvnJ8NqI0QoP24ahUsSwleAxlx2bYQ6358paQPXGZTh3hWIjgOjj4r5iH8LH5iL_CxvJhZY4Qty3Tb_6TewHblTgs |
linkProvider | ProQuest Ebooks |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=IT+Compliance+and+Controls&rft.au=DeLuccia%2C+James+J&rft.date=2008-01-01&rft.pub=Wiley&rft.isbn=9780470145012&rft.externalDBID=08O&rft.externalDocID=ciando486289 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.safaribooksonline.com%2Flibrary%2Fcover%2F9780470145012 http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97804702%2F9780470245453.jpg |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fportal.igpublish.com%2Figlibrary%2Famazonbuffer%2FWILEYB0004562_null_0_320.png |