Image from Google Jackets

Managing risk in information systems / Darril Gibson.

By: Material type: TextTextSeries: Jones & Bartlett Learning information systems security & assurance seriesPublication details: Burlington, MA : Jones & Bartlett Learning, c2015Edition: 2nd edDescription: xvii, 462 pSubject(s): DDC classification:
  • 005.8 23 GIB
LOC classification:
  • QA76.9.A25 G53 2015eb
Available also in a print ed.Summary: This second edition provides a comprehensive overview of the SSCP Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. It provides a modern and comprehensive view of information security policies and frameworks; examines the technical knowledge and software skills required for policy implementation; explores the creation of an effective IT security policy framework; discusses the latest governance, regulatory mandates, business drives, legal considerations, and much more. --
Tags from this library: No tags from this library for this title. Log in to add tags.

Title from title screen.

Includes bibliographical references and index.

Text.

This second edition provides a comprehensive overview of the SSCP Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. It provides a modern and comprehensive view of information security policies and frameworks; examines the technical knowledge and software skills required for policy implementation; explores the creation of an effective IT security policy framework; discusses the latest governance, regulatory mandates, business drives, legal considerations, and much more. --

Available also in a print ed.

Mode of access: Internet via World Wide Web.

Digitized and made available by: Books24x7.com.

There are no comments on this title.

to post a comment.
Powered by Koha & maintained by LRC, JK Lakshmipat University, Jaipur
Contact: [email protected]
Copyright © 2022 LRC, JK Lakshmipat University, Jaipur. All Rights Reserved.