IT security advice from experts /

Increasing every day in frequency and sophistication, planned cyber attacks are impacting systems, data and user access at virtually every business and government organization. Whether accidentally triggered by users opening their daily e-mail, or planned denial of services attack triggering a thous...

Full description

Bibliographic Details
Main Author: Oliva, Lawrence M.
Corporate Author: IGI Global.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2004.
Series:IT solutions series.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 02799nam a2200445 a 4500
001 29686
003 IGIG
005 20100714155851.0
006 m e d
007 cr bn||||m|||a
008 100626s2004 paua fsb 001 0 eng d
010 # # |z 2004005871 
020 # # |z 1591402476 (pbk.) 
020 # # |a 1591402484 (ebook) 
020 # # |a 9781591402480 (ebook) 
024 7 # |a 10.4018/978-1-59140-247-3  |2 doi 
035 # # |a (CaBNVSL)gtp00541790 
035 # # |a (OCoLC)707612109 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a QA76.9.A25  |b O64 2004e 
082 0 4 |a 005.8  |2 22 
100 1 # |a Oliva, Lawrence M. 
245 1 0 |a IT security  |b advice from experts /  |c Lawrence M. Oliva.  |h [electronic resource] : 
246 1 4 |a Information technology security. 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c 2004. 
300 # # |a electronic texts (ix, 171 p. : ill.) :  |b digital files. 
490 1 # |a IT solutions series 
504 # # |a Includes bibliographical references (p. 152-165) and index. 
505 0 # |a 1. Executive overview/ Lawrence M. Oliva -- Section I. Governance issues -- 2. Aligning assurance requirements, countermeasures, and business / Craig E. Kaucher -- 3. Protecting customer provided information / Charles Rex IV -- 4. Global IT risk management strategies / Chrisan Herrod -- Section II. Architecture issues -- 5. Architecture issues / Lawrence M. Oliva -- Section III. Technology issues -- 6. Wireless information security / Clifton Poole -- 7. Reference materials -- About the authors -- Index. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a Increasing every day in frequency and sophistication, planned cyber attacks are impacting systems, data and user access at virtually every business and government organization. Whether accidentally triggered by users opening their daily e-mail, or planned denial of services attack triggering a thousand zombie systems, IT management and corporate executives must be ready to respond, minimize and defeat threats to revenue generating and citizen facing operations. In many cases, the decision to protect information assets may materially impact agency or corporate budgets, previously planned investment and projected shareholder returns. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on June 26, 2010). 
650 # 0 |a Computer security. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2004005871  |z 1591402476 
830 # 0 |a IT solutions series. 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-247-3  |z View fulltext via EzAccess