Cantitate/Preț
Produs

Protecting Business Information: A Manager's Guide

Autor James A Schweitzer
en Limba Engleză Hardback – 10 dec 1995
Protecting Business Information: A Manager's guide is an introduction to the information resource, its sensitivity, value and susceptibility to risk. This book provides an outline for a business information security program and provides clear answers to the why and how of information protection.
Protecting Business Information' provides detailed processes for analysis, leading to a complete and adequate information classification. It includes a thorough description of the methods for information classification.


  • A valuable guide based on the author's fifteen year's experience in building and implementing information security programs for large, worldwide businesses
  • Provides a basis for the reasoning behind information protection processes
  • Suggests practical means for aligning an information security investment with business needs
Citește tot Restrânge

Preț: 41151 lei

Preț vechi: 53442 lei
-23% Nou

Puncte Express: 617

Preț estimativ în valută:
7882 8545$ 6552£

Carte tipărită la comandă

Livrare economică 02-16 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780750696586
ISBN-10: 0750696583
Pagini: 199
Dimensiuni: 152 x 229 x 17 mm
Greutate: 0.49 kg
Editura: ELSEVIER SCIENCE

Public țintă

Security managers, information security professionals

Cuprins

Part I - THE CASE FOR INFORMATION SECURITY 1. Some Background on Information Protection 2. The Management Issue: Why bother with Information Security? 3. Information Threats and Vunerabilities
Part II - PROTECTION OF INFORMATION:CONCEPTS AND METHODS 4. Information Concepts 5. Establishing Proprietary Rights to Information 6. Information Protection Methods 7. Securing the Information Environments 8. Computer Security 9. Communications Security
Part III - INFORMATION SECURITY MANAGEMENT 10. Information Security in the Business Enterprise 11. Relating Information Security Investment to Business Needs 12. Information Security Directives 13. Setting Up the Information Security Program 14. Administration and Maintenance of Information Security
Part IV - A COMPENDIUM OF TERMS WITH ISSUES, CONCERNS, AND SOLUTIONS