Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Board Briefing on IT Governance (2003). 2nd Edition. IT Governance Institute. Available from ISACA www.isaca.org
Information Security Management and Assurance – A Call to Action for Corporate Governance (1997). Available from http://www.theiia.org/download.cfm?file=22398. Accessed 2 April 2008
Information Risks: Whose Business are They? (2005). IT Governance Institute. Available from ISACA www.isaca.org
Information Security Governance – It’s your Responsibility (2005). Available from http://www.deloitte.com/dtt/cda/doc/content/UK_TA_Infosecurity_2005.pdf. Accessed 2 April 2008
COBIT (2005). Control Objectives for Information and Related Technology. Available from ISACA. www.isaca.org
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
von Solms, S., von Solms, R. (2009). Information Technology Governance. In: Information Security Governance. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79984-1_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-79984-1_2
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-79983-4
Online ISBN: 978-0-387-79984-1
eBook Packages: Computer ScienceComputer Science (R0)