OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Managing Risk and Information Security
Bookmark Share

Text

Managing Risk and Information Security

Protect to Enable - Personal Name; Malcolm W. Harkins - Personal Name;

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience.

Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk.


Availability

No copy data

Detail Information
Series Title
20 illustrations in colour
Call Number
XXVII, 187
Publisher
Apress Berkeley, CA : Apress Berkeley, CA., 2016
Collation
-
Language
English
ISBN/ISSN
978-1-4842-1455-8
Classification
NONE
Content Type
text
Media Type
computer
Carrier Type
online resource
Edition
1
Subject(s)
Computer Science
general
security
Specific Detail Info
-
Statement of Responsibility
Malcolm W. Harkins
Other Information
Cataloger
-
Source
https://link.springer.com/book/10.1007/978-1-4842-1455-8
Validator
Suwardi
Digital Object Identifier (DOI)
https://doi.org/10.1007/978-1-4842-1455-8
Journal Volume
-
Journal Issue
-
Subtitle
-
Parallel Title
-
Other version/related

No other version available

File Attachment
  • Managing Risk and Information Security
Comments

You must be logged in to post a comment

OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?