Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ISO/IEC 27002 (2005). Information Technology – Security Techniques – Code of Practice for Information Security Management. International Organization for Standardization. Available from www.iso.ch
COBIT (2005). Control Objectives for Information and Related Technology. Available from ISACA. www.isaca.org
Von Solms, SH (2005) Information Security Governance – Compliance Management vs Operational Management. Computers & Security, 24(6), 443–447
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
von Solms, S., von Solms, R. (2009). Organizing the Information Security Function. In: Information Security Governance. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79984-1_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-79984-1_9
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-79983-4
Online ISBN: 978-0-387-79984-1
eBook Packages: Computer ScienceComputer Science (R0)