Organizations and institutions are looking for implementing data-driven decision-making processes, business process improvement and methods for advancing faster in innovation. This book is about implementing the analytics process to develop a risk m...Daugiau...
The third edition has expended coverage essential topics such as threat analysis, data gathering, risk analysis, and risk assessment methods and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply cha...Daugiau...
The wave of data breaches raises two pressing questions: Why dont we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions....Daugiau...
This book suggests a methodology and a comprehensive simple tool (ERGOCHECK, downloadable for free from the website www.epmresearch.org ) for bringing together various potential risk factors to undertake a preliminary mapping of discomfort/danger in...Daugiau...
Serija: IIA (Institute of Internal Auditors) Series
(Išleidimo metai: 30-Dec-2008, Leidėjas: John Wiley & Sons Inc, ISBN-13: 9781119203544)
Computer Aided Audit Tools and Techniques (CAATTs) is a discipline that continues to evolve with the complexity and functionality of enterprise software solutions adopted by the business marketplace. This book is the only of its kind, providing stra...Daugiau...
Presents a perspective of the ISO/IEC 17799 Information Security Standard and provides an analysis of how to effectively measure an information security program using this standard. This book includes a qualitative-based risk assessment methodology....Daugiau...