資料來源: Google Book
Guarding your business :a management approach to security
- 其他作者: Ghosh, Sumit, , Malek-Zavarei, Manu. , Stohr, Edward A.,
- 出版: New York : Kluwer Academic/Plenum ©2004.
- 稽核項: 1 online resource (xiv, 252 pages) :illustrations.
- 標題: Computer networks Security measures -- United States -- Congresses. , Computer security. , Corporate Governance. , Workplace Culture. , BUSINESS & ECONOMICS Corporate Governance. , Computer security United States -- Congresses. , Business enterprises Computer networks -- Security measures. , Electronic commerce Security measures -- United States -- Congresses. , Computer security Congresses. , BUSINESS & ECONOMICS Leadership. , Computer security , BUSINESS & ECONOMICS Organizational Development. , Security measures , BUSINESS & ECONOMICS , Computer networks Security measures -- Congresses. , Computer networksSecurity measures , BUSINESS & ECONOMICS Workplace Culture. , Conference papers and proceedings. , Electronic commerce Security measures. , Leadership. , Business enterprises , Computer networks Security measures. , Electronic books. , Electronic commerce Security measures -- Congresses. , Data protection. , Business enterprises Computer networks -- Security measures -- Congresses. , Computer networksSecurity measures. , Business enterprises Computer networks -- Security measures -- United States -- Congresses. , Electronic commerce , Computer networks , Organizational Development. , Data protection , United States. , Data protection Congresses. , Security measures. , Data protection United States -- Congresses.
- ISBN: 0306486385 , 9780306486388
- ISBN: 9780306484940 , 0306484943
- 試查全文@TNUA:
- 附註: "Proceedings of the Management of Technology (MOT) Symposium held at Stevens Institute of Technology during October 22-24, 2002"--Intord Includes bibliographical references and index. Security Principles for Managers -- The Fundamental Nature of Network Security -- Computer Security: Sophisticated Enemies -- Digital Pearl Harbor: A Case Study in Industry Vulnerability to Cyber Attack -- Cybercrime and the Law: Balancing Privacy against the Need for Security -- Some Security Issues and Concerns in the Financial Services Industry -- Security and Insecurity of Wireless Networks -- Securing Business's Front Door: Password, Token and Biometric Authentication -- Managing Information Security Risks across the Enterprise -- Automatic Security Policy Management in Modern Networks: A New Approach to Security -- The Internal Revenue Service's Mission Assurance Program -- Organizing for Security -- About the Editors -- Index.
- 摘要: Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
- 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109032
- 系統號: 005308032
- 資料類型: 電子書
- 讀者標籤: 需登入
- 引用網址: 複製連結
Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
來源: Google Book
來源: Google Book
評分