Aims to offer a comprehensive and detailed exposition of the strategic use of IT in business and how the IT resource may be effectively controlled and made secure. It introduces a technique, devised by Chambers to measure levels of risk and control and includes a glossary to terms.