Start reading Ensuring Information Assets Protection on the free Kindle Reading App or on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here.

Deliver to your Kindle or other device

Enter a promotion code
or gift card
 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 

Ensuring Information Assets Protection [Kindle Edition]

Davis MBA CISA CICA Robert E.

Kindle Price: $36.24

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your email address or mobile phone number.

Best Books of the Year
Best Books of 2014
Looking for something great to read? Browse our editors' picks for 2014's Best Books of the Year in fiction, nonfiction, mysteries, children's books, and much more.

Book Description

Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization. “Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this publication, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.

Editorial Reviews

From the Author

Excerpts from a guest author interview with Robert E. Davis by Saurabh Sharma
 
Saurabh : Welcome to my blog Robert E. Davis. Shall we begin?
 
Robert: Yes. However, before we start the interview, I thank you for contacting me and enabling readers to acquire an enhanced perspective regarding my professional writings.
 
 
Saurabh: You are Welcome. Here is my first question to you:
 
Readers know you as an Author. But there is always something more than that. I would like to know the real you. How would you describe yourself as a human being?
 
Robert: I consider myself a courteous, articulate, spiritual, inquisitive, polite, and determined individual pursuing the 'American Dream' through my acquired knowledge and experience.

.
.
.

Saurabh: How and when did you decide that you wanted to write a book?
 
Robert: As I recollect, I was sitting in front of a library computer, when epiphany struck in December 2001 to write a detail, yet general, workbook regarding the IT audit process.
 
 
Saurabh: Who has been a real help from your family in your journey as an author?
 
Robert: From encouragement to commentary, all of my family members have aided me in becoming an author.

From the Inside Flap

Explicitly or implicitly, safeguarding assets is an inescapable fiduciary obligation bestowed on managers; whether the entity exists for-profit or not-for-profit. Fiduciary duties are an inherent managerial responsibility correlated to accountability that can be conveyed through legislation, regulation, or expectation. Foundationally, an operating entity's very existence is usually heavily dependent on how well employees safeguard assets utilized in fulfilling the organizational mission. Assumption for safeguarding assets should span the entity's total tangible and intangible resources. Specifically, information and associated technologies are assets requiring appropriate investments in protective measures to retain intrinsic value.

Generally, three unique elements are required for adequate information security architectures: people, processes and technology. For most entities, designing and operating adequate safeguards is an extremely complex process requiring a total compliance commitment from every employee empowered to access information assets. Absence of any one of the information security architectural components can create a weak link in safeguarding information assets and hinder security control usefulness.

Product Details

  • File Size: 1105 KB
  • Print Length: 170 pages
  • Publisher: Robert E. Davis; 1 edition (June 4, 2010)
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • ASIN: B003PPCTXS
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Not Enabled
  • Amazon Best Sellers Rank: #2,074,243 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?.


Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star
Share your thoughts with other customers

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 


Look for Similar Items by Category