|
|
|
|
LEADER |
03535nam a22005775i 4500 |
001 |
978-0-306-48638-8 |
003 |
DE-He213 |
005 |
20151204151725.0 |
007 |
cr nn 008mamaa |
008 |
100301s2004 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780306486388
|9 978-0-306-48638-8
|
024 |
7 |
|
|a 10.1007/b105306
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a HD28-70
|
072 |
|
7 |
|a KJC
|2 bicssc
|
072 |
|
7 |
|a BUS041000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4092
|2 23
|
245 |
1 |
0 |
|a Guarding Your Business
|h [electronic resource] :
|b A Management Approach to Security /
|c edited by Sumit Ghosh, Manu Malek, Edward A. Stohr.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2004.
|
300 |
|
|
|a XIV, 252 p. 16 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Background -- Security Principles for Managers -- The Fundamental Nature of Network Security -- Security Threats to the Organization -- Computer Security: Sophisticated Enemies -- Digital Pearl Harbor: A Case Study in Industry Vulnerability to Cyber Attack -- Cybercrime and the Law -- Overview of Latest Security Technologies -- Some Security Issues and Concerns in the Financial Services Industry -- Security and Insecurity of Wireless Networks -- Securing Business’s Front Door -- Organizing for Security-Managerial Issues -- Managing Information Security Risks across the Enterprise -- Automatic Security Policy Management in Modern Networks -- The Internal Revenue Service’s Mission Assurance Program -- Organizing for Security.
|
520 |
|
|
|a Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
|
650 |
|
0 |
|a Business.
|
650 |
|
0 |
|a Leadership.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a System theory.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
0 |
|a Social sciences.
|
650 |
|
0 |
|a Anthropology.
|
650 |
1 |
4 |
|a Business and Management.
|
650 |
2 |
4 |
|a Business Strategy/Leadership.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Electrical Engineering.
|
650 |
2 |
4 |
|a Social Sciences, general.
|
650 |
2 |
4 |
|a Systems Theory, Control.
|
650 |
2 |
4 |
|a Anthropology.
|
700 |
1 |
|
|a Ghosh, Sumit.
|e editor.
|
700 |
1 |
|
|a Malek, Manu.
|e editor.
|
700 |
1 |
|
|a Stohr, Edward A.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780306484940
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b105306
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SBE
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Business and Economics (Springer-11643)
|