Peer Review for material titled "Managing Risk and Information Security: Protect to Enable"
User Rating for material titled "Managing Risk and Information Security: Protect to Enable"
Member Comments for material titled "Managing Risk and Information Security: Protect to Enable"
Bookmark Collections for material titled "Managing Risk and Information Security: Protect to Enable"
Course ePortfolios for material titled "Managing Risk and Information Security: Protect to Enable"
Learning Exercises for material titled "Managing Risk and Information Security: Protect to Enable"
Accessibility Info for material titled "Managing Risk and Information Security: Protect to Enable"
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
A Bookmark with this title already existed.
Please limit a note about this material to 2048 characters
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II




        

Search > Material Results >

Managing Risk and Information Security: Protect to Enable

        

Managing Risk and Information Security: Protect to Enable

Logo for Managing Risk and Information Security: Protect to Enable
This is a free textbook that is offered by Amazon for reading on a Kindle.  Anybody can read Kindle books—even without a Kindle device—with the free Kindle app for smartphones and tablets.  Download the app for your device and start reading for free.'Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on... More
Material Type: Open Textbook
Technical Format: HTML/Text
Date Added to MERLOT: October 15, 2013
Date Modified in MERLOT: January 15, 2014
Author:
Submitter: Cathy Swift

Quality

  • Reviewed by members of Editorial board for inclusion in MERLOT.
    Editor Review
    Very good quality; in queue to be peer reviewed
    avg: 5 rating
  • User Rating (not rated)
  • Comments (none)
  • Learning Exercises (none)
  • Bookmark Collections (1)
  • Course ePortfolios (none)
  • Accessibility Info (none)

  • Rate this material
  • Create a learning exercise
  • Add accessibility information
  • Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
    Name the Bookmark Collection to represent the materials you will add
    Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
    Edit the information about the material in this {0}
    Submitting Bookmarks...

About

Primary Audience: College Upper Division, Graduate School, Professional
Mobile Compatibility: Not specified at this time
Technical Requirements:  
Language: English
Cost Involved: no
Source Code Available: unsure
Accessiblity Information Available: unsure
Creative Commons: unsure

Connections





QR Code for this Page

Users who viewed this material also viewed...

Discussion

Discussion for Managing Risk and Information Security: Protect to Enable

Log in to participate in the discussions or Register if you are not already a MERLOT member.

Return to Top of Page