Cantitate/Preț
Produs

Enterprise Security for the Executive: Setting the Tone from the Top

Autor Jennifer Bayuk Cuvânt înainte de Donald F. Donahue
en Limba Engleză Hardback – 24 noi 2009 – vârsta până la 17 ani
A guide to security written for business executives to help them better lead security efforts.Enterprise Security for the Executive: Setting the Tone from the Top is designed to help business executives become familiar with security concepts and techniques to make sure they are able to manage and support the efforts of their security team. It is the first such work to define the leadership role for executives in any business's security apparatus.In Enterprise Security for the Executive, author Jennifer Bayuk, a highly regarded information security specialist and sought-after consultant and speaker, explains protocols and technologies at just the right level of depth for the busy executive-in their language, not the tech-speak of the security professional. Throughout, the book draws a number of fact-based scenarios to illustrate security management basics, including 30 security "horror stories," and other analogies and terminology not commonly shared outside of the security profession.
Citește tot Restrânge

Preț: 36356 lei

Preț vechi: 44754 lei
-19% Nou

Puncte Express: 545

Preț estimativ în valută:
6958 7245$ 5880£

Carte disponibilă

Livrare economică 17 februarie-03 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780313376603
ISBN-10: 0313376603
Pagini: 180
Ilustrații: 22
Dimensiuni: 156 x 235 x 23 mm
Greutate: 0.43 kg
Ediția:New.
Editura: Bloomsbury Publishing
Colecția Praeger
Locul publicării:New York, United States

Caracteristici

Details 30 "security horror stories," giving executives an insider's look at real criminal and malicious breaches and how to prepare for them

Notă biografică

Jennifer L. Bayuk is an independent consultant and adjunct professor at Stevens Institute of Technology in Hoboken, NJ.

Cuprins

Foreword by Donald F. DonahueAcknowledgmentsIntroduction1. Tone at the Top2. Threats and Vulnerabilities3. Triad and True4. Secure Products and Services5. Security through Matrix Management6. Navigating the Regulatory Landscape7. Investigation and Remediation8. The Right StuffConclusionAppendix: Case StudyNotesIndex