LEADER 02869nam 22006491 450 001 9910452704903321 005 20200520144314.0 010 $a1-84928-454-7 010 $a1-299-46854-3 010 $a1-84928-453-9 035 $a(CKB)2550000001019510 035 $a(EBL)1186301 035 $a(OCoLC)843642481 035 $a(SSID)ssj0000907218 035 $a(PQKBManifestationID)11448484 035 $a(PQKBTitleCode)TC0000907218 035 $a(PQKBWorkID)10855480 035 $a(PQKB)11568917 035 $a(MiAaPQ)EBC1186301 035 $a(CaSebORM)9781849284547 035 $a(Au-PeEL)EBL1186301 035 $a(CaPaEBR)ebr10772215 035 $a(CaONFJC)MIL478104 035 $a(EXLCZ)992550000001019510 100 $a20130516d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGovernance and internal controls for cutting edge IT /$fKaren F. Worstell 205 $a1st edition 210 1$aEly, Cambridgeshire :$cIT Governance Publishing,$d2013. 215 $a1 online resource (133 p.) 300 $aDescription based upon print version of record. 311 $a1-84928-376-1 320 $aIncludes bibliographical references. 327 $aCutting edge IT -- Governance -- Legislative and regulatory compliance concerns -- Getting the business case right -- Service level management -- Security and control approach -- Data management -- Business continuity and recovery -- Secure IT-enabled organizations. 330 $aIn Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards. 606 $aBusiness enterprises$xInformation technology$xManagement 606 $aBusiness enterprises$xInformation technology$xSecurity measures 606 $aInformation technology$xManagement 606 $aInformation technology$xSecurity measures 608 $aElectronic books. 615 0$aBusiness enterprises$xInformation technology$xManagement. 615 0$aBusiness enterprises$xInformation technology$xSecurity measures. 615 0$aInformation technology$xManagement. 615 0$aInformation technology$xSecurity measures. 676 $a650.11 700 $aWorstell$b Karen F$0999172 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452704903321 996 $aGovernance and internal controls for cutting edge IT$92292390 997 $aUNINA LEADER 01334oam 2200421zu 450 001 996202214703316 005 20210807001321.0 010 $a0-7695-4314-6 035 $a(CKB)2670000000070667 035 $a(SSID)ssj0000527814 035 $a(PQKBManifestationID)12179487 035 $a(PQKBTitleCode)TC0000527814 035 $a(PQKBWorkID)10526347 035 $a(PQKB)11109459 035 $a(NjHacI)992670000000070667 035 $a(EXLCZ)992670000000070667 100 $a20160829d2010 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$a2010 International Conference on Reconfigurable Computing and FPGAs 210 31$a[Place of publication not identified]$cI E E E$d2010 215 $a1 online resource (xix, 468 pages) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-4244-9523-7 606 $aField programmable gate arrays$vCongresses 606 $aAdaptive computing systems$vCongresses 615 0$aField programmable gate arrays 615 0$aAdaptive computing systems 676 $a004 702 $aIEEE Staff 801 0$bPQKB 906 $aPROCEEDING 912 $a996202214703316 996 $a2010 International Conference on Reconfigurable Computing and FPGAs$92415638 997 $aUNISA