Managing Risk and Information Security: Protect to Enable (First Edition)
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from lo...
Bewaard in:
Hoofdauteur: | |
---|---|
Formaat: | Elektronisch Hoofdstuk |
Taal: | Engels |
Gepubliceerd in: |
Apress
2013
|
Online toegang: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Voeg label toe
Geen labels, Wees de eerste die dit record labelt!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_52668 | ||
005 | 20210211 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210211s2013 xx |||||o ||| 0|eng d | ||
020 | |a /doi.org/10.1007/978-1-4302-5114-9 | ||
020 | |a 9781430251132 | ||
020 | |a 9781430251149 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a https://doi.org/10.1007/978-1-4302-5114-9 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
100 | 1 | |a Malcolm W. Harkins |4 auth | |
245 | 1 | 0 | |a Managing Risk and Information Security: Protect to Enable (First Edition) |
260 | |b Apress |c 2013 | ||
300 | |a 1 electronic resource (152 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies-such as social media and the huge proliferation of Internet-enabled devices-while minimizing risk. | ||
536 | |a Intel | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc/4.0/ | ||
546 | |a English | ||
856 | 4 | 0 | |a www.oapen.org |u https://link.springer.com/book/10.1007/978-1-4302-5114-9 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/52668 |7 0 |z DOAB: description of the publication |