|
|
|
|
LEADER |
03556nam a22005655i 4500 |
001 |
23366 |
003 |
DE-He213 |
005 |
20151204151725.0 |
007 |
cr nn 008mamaa |
008 |
100301s2004 xxu| s |||| 0|eng d |
020 |
# |
# |
|a 9780306486388
|9 978-0-306-48638-8
|
024 |
7 |
# |
|a 10.1007/b105306
|2 doi
|
050 |
# |
4 |
|a HD28-70
|
072 |
# |
7 |
|a KJC
|2 bicssc
|
072 |
# |
7 |
|a BUS041000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4092
|2 23
|
245 |
1 |
0 |
|a Guarding Your Business
|b A Management Approach to Security /
|c edited by Sumit Ghosh, Manu Malek, Edward A. Stohr.
|h [electronic resource] :
|
264 |
# |
1 |
|a Boston, MA :
|b Springer US,
|c 2004.
|
300 |
# |
# |
|a XIV, 252 p. 16 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
505 |
0 |
# |
|a Background -- Security Principles for Managers -- The Fundamental Nature of Network Security -- Security Threats to the Organization -- Computer Security: Sophisticated Enemies -- Digital Pearl Harbor: A Case Study in Industry Vulnerability to Cyber Attack -- Cybercrime and the Law -- Overview of Latest Security Technologies -- Some Security Issues and Concerns in the Financial Services Industry -- Security and Insecurity of Wireless Networks -- Securing BusinessỚ"s Front Door -- Organizing for Security-Managerial Issues -- Managing Information Security Risks across the Enterprise -- Automatic Security Policy Management in Modern Networks -- The Internal Revenue ServiceỚ"s Mission Assurance Program -- Organizing for Security.
|
520 |
# |
# |
|a Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
|
650 |
# |
0 |
|a Business.
|
650 |
# |
0 |
|a Leadership.
|
650 |
# |
0 |
|a Management information systems.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a System theory.
|
650 |
# |
0 |
|a Electrical engineering.
|
650 |
# |
0 |
|a Social sciences.
|
650 |
# |
0 |
|a Anthropology.
|
650 |
1 |
4 |
|a Business and Management.
|
650 |
2 |
4 |
|a Business Strategy/Leadership.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Electrical Engineering.
|
650 |
2 |
4 |
|a Social Sciences, general.
|
650 |
2 |
4 |
|a Systems Theory, Control.
|
650 |
2 |
4 |
|a Anthropology.
|
700 |
1 |
# |
|a Ghosh, Sumit.
|e editor.
|
700 |
1 |
# |
|a Malek, Manu.
|e editor.
|
700 |
1 |
# |
|a Stohr, Edward A.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780306484940
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/b105306
|z View fulltext via EzAccess
|
912 |
# |
# |
|a ZDB-2-SBE
|
912 |
# |
# |
|a ZDB-2-BAE
|
950 |
# |
# |
|a Business and Economics (Springer-11643)
|