{"id":8521,"date":"2013-07-29T07:14:09","date_gmt":"2013-07-29T10:14:09","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=8521"},"modified":"2014-02-05T23:07:37","modified_gmt":"2014-02-06T02:07:37","slug":"managing-risk-and-information-security","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/managing-risk-and-information-security\/","title":{"rendered":"Managing Risk and Information Security"},"content":{"rendered":"<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-8522\" alt=\"Managing Risk and Information Security\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/07\/managing-risk-and-information-security.jpg\" width=\"145\" height=\"218\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/07\/managing-risk-and-information-security.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/07\/managing-risk-and-information-security-99x150.jpg 99w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/><span style=\"color: #003366;\">Malcolm Harkins<\/span><\/strong><\/p>\n<p><span style=\"color: #003366;\"><strong>Editor Apress<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Descripci\u00f3n:<\/strong><\/span> Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies\u2014such as social media and the huge proliferation of Internet-enabled devices\u2014while minimizing risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malcolm Harkins Editor Apress Descripci\u00f3n: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from&hellip; <\/p>\n","protected":false},"author":3,"featured_media":8522,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,19,20],"tags":[],"class_list":["post-8521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-risco-e-perdas","category-seguranca-da-informacao"],"views":232,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/8521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=8521"}],"version-history":[{"count":3,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/8521\/revisions"}],"predecessor-version":[{"id":10035,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/8521\/revisions\/10035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/8522"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=8521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=8521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=8521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}