Service-Telefon
+49(0)6151-988520
German English
Fachgebiete

Details

1732297 Babiak, Jan; Butters, John:
Defending the Digital Frontier
Practical Security for Management
Preis:   € 25,90

Einband: Gb
Auflage: 2. Auflage
Verlag: John Wiley & Sons New York
Erscheinungsdatum: 12/2004
Seiten: 254 S.

ISBN-10: 0-471-68087-7   
ISBN-13: 978-0-471-68087-1


In den Warenkorb

Weitere Fachbücher aus dem Fachgebiet:
Unternehmenstechnologie | Wirtschaft | 
zurück
Beschreibung
Enhance the digital security knowledge-base within any organization
In today's competitive business environment, information and information technology have become crucial for a company's success. Ensuring the confidentiality of such information-financial, trade secrets, and the like-has become key. Defending the Digital Frontier, Second Edition describes where organizations are vulnerable and identifies protective measures that rely on people and process as much as technology. This book is a practical guide aimed at business leaders and executives, explaining why digital security is not a technical function, but a risk management operation, and illustrates an approach for creating an enterprise-wide security culture based on business-led risk-management principles.
Ernst & Young is a global leader in professional services, providing tax, assurance, and transaction advice to thousands of individuals as well as domestic and global businesses. Ernst & Young provides independent security solutions for some of the world's most information-intensive organizations, including numerous Fortune 500 companies, and the federal government.
Inhalt
List of Figures and Tables.
Foreword.
Preface.
Acknowledgments.
PART ONE: THE CHALLENGE OF THE FRONTIER.
Chapter 1: Living at the Digital Frontier.
Chapter 3: Organisational Components and Security Objectives.
PART TWO: THE AGENDA FOR ACTION.
Chapter 4: The Security Agenda.
Chapter 5: The Security Life Cycle.
PART THREE: THE APPROACH FOR SAFETY.
Chapter 6: The Security Culture.
Chapter 7: The Risk Frontier.
Chapter 8: Road Map for Success.
Appendix A: Security-Related Laws and Regulations.
Appendix B: Threat Vectors.
Appendix C: Ernst & Young 2004 Digital Security Overview: An Executive Guide and Diagnostic.
Endnotes.
Glossary of Digital Security Terminology.
Index.
 © academic-books.com, Alle Rechte vorbehalten.