Muutke küpsiste eelistusi

E-raamat: Computers, Business, and Security: The New Role for Security

  • Formaat: PDF+DRM
  • Ilmumisaeg: 20-May-2014
  • Kirjastus: Butterworth-Heinemann Ltd
  • Keel: eng
  • ISBN-13: 9781483144894
  • Formaat - PDF+DRM
  • Hind: 27,29 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 20-May-2014
  • Kirjastus: Butterworth-Heinemann Ltd
  • Keel: eng
  • ISBN-13: 9781483144894

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.

Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communications systems. Other chapters consider the integration of electronic information technology into the security function. This book discusses as well the need for the integration of computing technology into the business security staff. The final chapter deals with the structure of the security program and explains the components of the overall security responsibility. This book is a valuable resource for professional business security managers, systems administrators, and software/hardware maintenance specialists.
PrefacePart I The Computer and Security in the Information Age
Chapter 1 Managing Security in the Information Age The Five Critical
Tasks Implications for Business Security
Chapter 2 Computers and
Security Risks in Using Computers Applying Information
Security Technology Defining Preferred Protection Methods
Levels of Protection Protecting Mental Information
Protecting Written Information Protecting Electronic Information
The Technology of Attack Causes of Security Violations
Protection Measures SummaryPart II The Five Critical Tasks
Chapter 3 Critical Task 1: Integrating Computing into the Security Function
Technical Competence on the Security Staff Selecting the
Right Person Job Assignments Electronic Security Tasks
Electronic Information Security Standards
Chapter 4 Critical Task 2:
Integrating Technology into the Security Function Ultrasonics
Sensing Technologies Video Control Systems
Biometrics and Smart Cards Electronic Surveillance and
Countermeasures Radio Wave Interception System Integration
Chapter 5 Critical Task 3: Adapting the Business Security Management
Process to Information Age Requirements Information Application
Reduction of Overhead, Improvement of Quality, Return on Assets
Making Security Investment Decisions Security Strategy as a Basis
for Choice
Chapter 6 Critical Task 4: Protecting the Business Information
Resource Background A Beginning Information
Resource Management Attributes of Quality Information
Implementing Information Resource Management Security Roles in
Information Resource Management Classification of Information
Setting Policy Regulations Covering Classification
General Guidelines Classification References
Chapter 7 Critical
Task 5: Establishing Security as an Essential Management Function
The Security Manager as Business Executive Establishing Leadership
among Peers in the Company The Security Manager and Senior Executive
Management Executive Management Characteristics
Considerations: The Security Manager and Executive Management Risk
Management Concepts: A FrameworkPart III Securing Today's Business
Chapter 8 Putting It Together: A Security Program for the Information Age
Program Assumptions and Requirements The Security Manager as a
Business Manager The Right Security Product Making
Competent Technology Decisions Demonstrating a Contribution
Security Organization for the Information Age Principles of Security
Organization Organizational Alternatives Planning
Setting the Security Organizational Structure Rules of Thumb for
Security Organization Implementing the Security Program
Getting the Security Message to the People The Security Coordinator
Network The Security Coordinator's Tasks Security
Coordinator Selection, Training, and Motivation
Chapter 9 Business
Security Operations in the Information Age Leadership
Working Relationships The Core Functions Support to Unit or
Local Security Activities Training The Security Career Path
Unit or Local Responsibilities
Chapter 10 Security Policies and
Standards Policy Standards or Procedures Details
for Security Standards Preparing the Standards Organization
of the Standards An Illustrative Electronic Information Security
Standard Sample StandardsAppendix A A Primer on ComputingAppendix B
Sample Information Security PolicyAppendix C Sample Electronic Security
ReviewAppendix D A Glossary of Technology TermsReferencesIndex