Enterprise security risk management : concepts and applilcations
Showing you how ESRM applies fundamental risk principles to manage all security risks, this step-by-step book includes realistic case studies, questions to help you assess your own security program, thought-provoking discussion questions, and useful figures and tables. --
Saved in:
| Main Authors | , |
|---|---|
| Other Authors | |
| Format | Electronic eBook |
| Language | English |
| Published |
Brooksfield, Connecticut :
Rothstein Publishing,
2018.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781944480431 9781944480424 |
| Physical Description | 1 online zdroj (407 stran) : ilustrace, tables. |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 91176 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251008101013.0 | ||
| 006 | m o d | ||
| 007 | cr |n | ||
| 008 | 180102t20182018enka ob 000 0 eng d | ||
| 999 | |c 91176 |d 91176 | ||
| 020 | |a 9781944480431 |q (ebook) | ||
| 020 | |a 9781944480424 |q (ebook) | ||
| 035 | |a (OCoLC)1020004828 | ||
| 040 | |a IDEBK |b eng |e rda |c IDEBK |d OCLCF |d N$T |d COO |d UAB | ||
| 072 | 7 | |a 005 |x Management. Řízení |2 Konspekt |9 4 | |
| 080 | |a 005.334:005.332.3 |2 MRF | ||
| 080 | |a (048.8) |2 MRF | ||
| 080 | |a (0.034.2:08) |2 MRF | ||
| 100 | 1 | |a Allen, Brian J., |e author. | |
| 245 | 1 | 0 | |a Enterprise security risk management : |b concepts and applilcations / |c Brian J. Allen, Rachelle Loyear ; Kristen Noakes-Fry, editor. |
| 264 | 1 | |a Brooksfield, Connecticut : |b Rothstein Publishing, |c 2018. | |
| 264 | 4 | |c ©2018 | |
| 300 | |a 1 online zdroj (407 stran) : |b ilustrace, tables. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity | ||
| 520 | |a Showing you how ESRM applies fundamental risk principles to manage all security risks, this step-by-step book includes realistic case studies, questions to help you assess your own security program, thought-provoking discussion questions, and useful figures and tables. -- |c Edited summary from book. | ||
| 590 | |a eBooks on EBSCOhost |b All EBSCO eBooks | ||
| 650 | 0 | 7 | |a rizikový management |7 ph116047 |2 czenas |
| 650 | 0 | 9 | |a risk management |2 eczenas |
| 655 | 7 | |a monografie |7 fd132842 |2 czenas | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a monographs |2 eczenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Loyear, Rachelle, |e author. | |
| 700 | 1 | |a Noakes-Fry, Kristen, |e editor. | |
| 856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1645658&authtype=ip,shib&custid=s3936755 |
| 942 | |2 udc | ||
| 992 | |c EBOOK-TN |c EBSCO | ||
| 993 | |x NEPOSILAT |y EIZ | ||