Five steps to IT risk management best practices
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Valor |
---|---|---|---|
LDR | 00000nab a2200000 i 4500 | ||
001 | MAP20071508205 | ||
003 | MAP | ||
005 | 20080418125825.0 | ||
007 | hzruuu---uuuu | ||
008 | 060724e20060701usa|||| | |00010|eng d | ||
040 | $aMAP$bspa | ||
084 | $a7 | ||
100 | 1 | $0MAPA20080045814$aHughes, Greg | |
245 | 1 | 0 | $aFive steps to IT risk management best practices$cGreg Hughes |
520 | 8 | $aAs individuals, corporations, and our economy grow increasingly dependent on the Internet and IT systems, the risk in these systems become far more visible and significant. Breaches or failures of information systems cause serious business crises, including reputation damage caused by identify theft, business losses stemming from system failures and regulatory restrictions arising from compliance issues. | |
650 | 1 | 1 | $0MAPA20080591182$aGerencia de riesgos |
650 | 1 | 1 | $0MAPA20080623791$aTecnología de la información |
650 | 1 | 1 | $0MAPA20080587581$aRiesgo informático |
650 | 1 | 1 | $0MAPA20080622251$aSeguridad de la información |
650 | 1 | 1 | $0MAPA20080584344$aControl de riesgos |
650 | 1 | 1 | $0MAPA20080612580$aSistemas de información |
650 | 1 | 1 | $0MAPA20080603731$aSeguridad informática |
650 | 1 | 1 | $0MAPA20080623517$aProtección de la información |
650 | 1 | 1 | $0MAPA20080552619$aSeguridad |
740 | 0 | $aRisk management | |
773 | 0 | $tRisk management$dNew York$gVol. 53, nº 7, July 2006 ; p. 34-40 |