Managing Risk in Information Systems

Revised and updated with the latest data in the field, the Second Edition of Managing Risk in Information Systems provides a comprehensive overview of the SSCP(R) Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastruc...

Full description

Saved in:
Bibliographic Details
Main Author: Gibson, Darril (Author)
Format: Manuscript Book
Language:English
Published: Burlington, Massachusetts(MA) Jones & Bartlett Learning 2015
Edition:Second edition
Series:Jones & Bartlett Learning information systems security & assurance series
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000ntm a2200000 i 4501
001 wils-912720
005 201841511221
008 181108t2015 MAU ag| |#001 ##ENG#D
020 # # |a 9781284055955  |q paperback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a QA76.9.A25  |b G53 2015 
100 1 # |a Gibson, Darril  |e author 
245 1 0 |a Managing Risk in Information Systems  |c Darril Gibson 
250 # # |a Second edition 
264 # 1 |a Burlington, Massachusetts(MA)  |b Jones & Bartlett Learning  |c 2015 
300 # # |a xvii, 462 pages :  |b illustrations  |c 23 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
490 0 # |a Jones & Bartlett Learning information systems security & assurance series 
504 # # |a Includes bibliographical references and indexes 
520 # # |a Revised and updated with the latest data in the field, the Second Edition of Managing Risk in Information Systems provides a comprehensive overview of the SSCP(R) Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. 
650 # # |a Electronic information resources  |x Access control 
650 # # |a Computer security 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=912720 
998 # # |a 00250##a006.2.2||00250##b006.2.2||00255##a006.2.2||00260##a006.2.2||00260##b006.2.2||00260##c006.2.2||00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00500##a006.2.2||00502##a006.2.2||00520##a006.2.2||00520##b006.2.2||00538##a006.2.2||00546##a006.2.2||00730##a006.2.2||00730##d006.2.2||00730##f006.2.2||00730##n006.2.2||00730##p006.2.2||