買這商品的人也買了...
-
$931Invitation to Cryptography
-
$1,274Fundamentals of Computer Security (Hardcover)
-
$931Security in Computing, 3/e (平裝)
-
$931Internet Security: Cryptographic Principles, Algorithms and Protocols (Hardcover)
-
$680$666 -
$600$199 -
$850$723 -
$350$277 -
$580$493 -
$650$514 -
$1,150$1,127 -
$1,400$1,372 -
$850$672 -
$760$600 -
$780$663 -
$680$537 -
$450$351 -
$680$537 -
$450$351 -
$1,200$1,176 -
$820$804 -
$550$468 -
$290$226 -
$450$351 -
$5,800$5,510
相關主題
商品描述
Description
An accountant's guide to managing control risks
In today's networked world, security and risk control are no longer just the province of the IT department. Accountants and other business managers who are responsible for corporate risk management must fully understand the control and security risks that can affect the financial health of the entire organization. Risks, Controls and Security: Concepts and Applications introduces you to today's control risks and how to manage them.
Beginning with basic systems controls and security awareness, the book provides you with a clear comprehension of the concepts, issues, and techniques of information security in a networked environment. Moving from theory to application, you'll cover all the key security principles that are applicable to all businesses, including e-businesses:
* Enterprise risk management
* Control and security frameworks
* Basic cryptography and public key infrastructure
* Security for operating systems, applications, database management systems, and telecommunications
* Network and web security
* Policy, regulation, and ethics
Real-world problem scenarios and a wealth of pedagogical features--discussion questions, short exercises, example cases, and "concept maps" that help you visualize the material--ensure your confident grasp of the material and enable you to put "security into practice."
Designed for practicing professionals as well as for students in accounting, business management, and computer science, Risks, Controls and Security will prepare you well for meeting the challenge of protecting information assets.
Table of Contents
Preface.1. Enterprise Risk Management.
2. Information Systems Concerns and Risks.
3. Control and Security Frameworks.
4. Systems Availability and Business Continuity.
5. Basic Cryptography.
6. Public Key Infrastructure.
7. Operating Systems Security.
8. Application Security.
9. Database Management Systems Security.
10. Telecommunications Security.
11. Network Security.
12. Web Security.
13. Policy, Regulation, and Ethics.
Glossary.
Index.