Risks, Controls, and Security: Concepts and Applications, 1st Edition

, by ;
Risks, Controls, and Security: Concepts and Applications, 1st Edition by Vasant Raval (Creighton Univ. ); Ashok Fichadia, 9780471485797
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780471485797 | 0471485799
  • Cover: Hardcover
  • Copyright: 1/1/2007

  • Buy New

    Print on Demand: 2-4 Weeks. This item cannot be cancelled or returned.

    $162.29

An accountant's guide to managing control risks In today's networked world, security and risk control are no longer just the province of the IT department. Accountants and other business managers who are responsible for corporate risk management must fully understand the control and security risks that can affect the financial health of the entire organization. Risks, Controls and Security: Concepts and Applications introduces you to today's control risks and how to manage them. Beginning with basic systems controls and security awareness, the book provides you with a clear comprehension of the concepts, issues, and techniques of information security in a networked environment. Moving from theory to application, you'll cover all the key security principles that are applicable to all businesses, including e-businesses: 'ˆ— Enterprise risk management 'ˆ— Control and security frameworks 'ˆ— Basic cryptography and public key infrastructure 'ˆ— Security for operating systems, applications, database management systems, and telecommunications 'ˆ— Network and web security 'ˆ— Policy, regulation, and ethics Real-world problem scenarios and a wealth of pedagogical features--discussion questions, short exercises, example cases, and "concept maps" that help you visualize the material--ensure your confident grasp of the material and enable you to put "security into practice." Designed for practicing professionals as well as for students in accounting, business management, and computer science, Risks, Controls and Security will prepare you well for meeting the challenge of protecting information assets.
Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button