LEADER 04538nam 2200601 a 450 001 9910452955403321 005 20210117134844.0 010 $a1-280-11294-8 010 $a0-203-99231-8 010 $a1-283-64228-X 010 $a1-134-62738-6 035 $a(CKB)2550000000707867 035 $a(StDuBDS)AH24412862 035 $a(MiAaPQ)EBC240531 035 $a(MiAaPQ)EBC5292996 035 $a(Au-PeEL)EBL5292996 035 $a(CaONFJC)MIL395478 035 $a(OCoLC)1027132905 035 $a(EXLCZ)992550000000707867 100 $a20000727d2000 fy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and control in information systems$b[electronic resource] $ea guide for business and accounting /$fAndrew Hawker 210 $aLondon $cRoutledge$d2000 215 $a1 online resource (400p.) 225 0$aRoutledge information systems textbooks 311 $a0-415-20534-4 320 $aIncludes bibliographical references and index. 327 $aIntroduction Part 1: Threats and Risks 1.Information under Threat 2.Risk Appraisal Part 2:Controls for Internal Services 3.Computerised Controls: the Organizational Context 4.Access Controls 5.Controls within Business Processes Part 3:Controls for Networked Services 6.Controls for Network Communications 7.Managing Security for Network Services 8.Controls for Local Area Networks and Small Systems Part 4:Business Continuity and Archiving 9.Business Continuity 10.Controls for Archived Data Part 5 :Computer Audit 11.Computer Audit:Introduction of New Systems 12.Computer Audit: Control of Existing Systems 13.Computer Forensics Part 6:Regulation and Standards 14.Security Standards and Codes of Practice. 330 $aThis is a comprehensive review written for the business reader. It includes coverage of recent developments in electronic commerce, as well as the more traditional systems found in many organizations, both large and small. 330 $bWith the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues. Responsibility for ensuring that controls are well designed and properly managed can no longer simply be delegated to the technical experts. It has become an area in which the whole management team needs to be involved. This comprehensive review, written for the business reader, includes coverage of recent developments in electronic commerce, as well as the more traditional systems found in many organizations, both large and small. Intended for any manager whose work depends on financial or other business information, it includes case studies, summaries and review questions, making it equally suitable as a source text for students of business studies at postgraduate or advanced level. With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues. Responsibility for ensuring that controls are well designed and properly managed can no longer simply be delegated to the technical experts. It has become an area in which the whole management team needs to be involved. This comprehensive review, written for the business reader, includes coverage of recent developments in electronic commerce, as well as the more traditional systems found in many organizations, both large and small. Intended for any manager whose work depends on financial or other business information, it includes case studies, summaries and review questions, making it equally suitable as a source text for students of business studies at postgraduate or advanced level. 606 $aElectronic data processing departments$xAuditing 606 $aComputer security 606 $aInformation technology$xSecurity measures 606 $aComputers and IT$2eflch 608 $aElectronic books.$2lcsh 615 0$aElectronic data processing departments$xAuditing. 615 0$aComputer security. 615 0$aInformation technology$xSecurity measures. 615 7$aComputers and IT. 676 $a005.8 700 $aHawker$b Andrew$0532747 801 0$bStDuBDS 801 1$bStDuBDS 801 2$bStDuBDSZ 801 2$bUkPrAHLS 906 $aBOOK 912 $a9910452955403321 996 $aSecurity and control in information systems$9901705 997 $aUNINA