Managing Risk and Information Security: Protect to Enable (First Edition)
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from lo...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Apress
2013
|
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_52668 | ||
005 | 20210211 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210211s2013 xx |||||o ||| 0|eng d | ||
020 | |a /doi.org/10.1007/978-1-4302-5114-9 | ||
020 | |a 9781430251132 | ||
020 | |a 9781430251149 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a https://doi.org/10.1007/978-1-4302-5114-9 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
100 | 1 | |a Malcolm W. Harkins |4 auth | |
245 | 1 | 0 | |a Managing Risk and Information Security: Protect to Enable (First Edition) |
260 | |b Apress |c 2013 | ||
300 | |a 1 electronic resource (152 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies-such as social media and the huge proliferation of Internet-enabled devices-while minimizing risk. | ||
536 | |a Intel | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc/4.0/ | ||
546 | |a English | ||
856 | 4 | 0 | |a www.oapen.org |u https://link.springer.com/book/10.1007/978-1-4302-5114-9 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/52668 |7 0 |z DOAB: description of the publication |