Búsqueda

Five steps to IT risk management best practices

Fichero PDF / PDF file
Registro MARC
Tag12Valor
LDR  00000nab a2200000 i 4500
001  MAP20071508205
003  MAP
005  20080418125825.0
007  hzruuu---uuuu
008  060724e20060701usa|||| | |00010|eng d
040  ‎$a‎MAP‎$b‎spa
084  ‎$a‎7
1001 ‎$0‎MAPA20080045814‎$a‎Hughes, Greg
24510‎$a‎Five steps to IT risk management best practices‎$c‎Greg Hughes
5208 ‎$a‎As individuals, corporations, and our economy grow increasingly dependent on the Internet and IT systems, the risk in these systems become far more visible and significant. Breaches or failures of information systems cause serious business crises, including reputation damage caused by identify theft, business losses stemming from system failures and regulatory restrictions arising from compliance issues.
65011‎$0‎MAPA20080591182‎$a‎Gerencia de riesgos
65011‎$0‎MAPA20080623791‎$a‎Tecnología de la información
65011‎$0‎MAPA20080587581‎$a‎Riesgo informático
65011‎$0‎MAPA20080622251‎$a‎Seguridad de la información
65011‎$0‎MAPA20080584344‎$a‎Control de riesgos
65011‎$0‎MAPA20080612580‎$a‎Sistemas de información
65011‎$0‎MAPA20080603731‎$a‎Seguridad informática
65011‎$0‎MAPA20080623517‎$a‎Protección de la información
65011‎$0‎MAPA20080552619‎$a‎Seguridad
7400 ‎$a‎Risk management
7730 ‎$t‎Risk management‎$d‎New York‎$g‎Vol. 53, nº 7, July 2006 ; p. 34-40