Configuration Management: Using COBIT 5

Configuration Management: Using COBIT 5
Author :
Publisher : ISACA
Total Pages : 88
Release :
ISBN-10 : 9781604203455
ISBN-13 : 1604203455
Rating : 4/5 (55 Downloads)

Book Synopsis Configuration Management: Using COBIT 5 by : ISACA

Download or read book Configuration Management: Using COBIT 5 written by ISACA and published by ISACA. This book was released on 2013-07-23 with total page 88 pages. Available in PDF, EPUB and Kindle. Book excerpt:


Configuration Management: Using COBIT 5 Related Books

Configuration Management: Using COBIT 5
Language: en
Pages: 88
Authors: ISACA
Categories: Technology & Engineering
Type: BOOK - Published: 2013-07-23 - Publisher: ISACA

DOWNLOAD EBOOK

Controls & Assurance in the Cloud: Using COBIT 5
Language: en
Pages: 266
Authors: ISACA
Categories: Technology & Engineering
Type: BOOK - Published: 2014-03-24 - Publisher: ISACA

DOWNLOAD EBOOK

"This practical guidance was created for enterprises using or considering using cloud computing. It provides a governance and control framework based on COBIT 5
New Perspectives on Information Systems Modeling and Design
Language: en
Pages: 352
Authors: Rosado da Cruz, António Miguel
Categories: Computers
Type: BOOK - Published: 2018-11-09 - Publisher: IGI Global

DOWNLOAD EBOOK

Information modeling plays an important role in every level of the enterprise information system’s architecture. Modeling allows organizations to adapt and be
Securing an IT Organization through Governance, Risk Management, and Audit
Language: en
Pages: 239
Authors: Ken E. Sigler
Categories: Business & Economics
Type: BOOK - Published: 2016-01-05 - Publisher: CRC Press

DOWNLOAD EBOOK

This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical
Information Security Management Systems
Language: en
Pages: 282
Authors: Heru Susanto
Categories: Computers
Type: BOOK - Published: 2018-06-14 - Publisher: CRC Press

DOWNLOAD EBOOK

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at i