My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Result Page: Previous Next
Can't find that book? Try BONUS+
 
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Cover Art
E-RESOURCE
Author Management of Technology Symposium (2002 : Stevens Institute of Technology)

Title Guarding your business [electronic resource] : a management approach to security / edited by Sumit Ghosh, Manu Malek and Edward A. Stohr.

Published New York : Kluwer Academic/Plenum, 2004.

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Physical description 1 online resource (xiv, 252 p.) : ill.
Notes "Proceedings of the Management of Technology (MOT) Symposium held at Stevens Institute of Technology during October 22-24, 2002"--Intord.
Bibliography Includes bibliographical references and index.
Contents Security Principles for Managers -- The Fundamental Nature of Network Security -- Computer Security: Sophisticated Enemies -- Digital Pearl Harbor: A Case Study in Industry Vulnerability to Cyber Attack -- Cybercrime and the Law: Balancing Privacy against the Need for Security -- Some Security Issues and Concerns in the Financial Services Industry -- Security and Insecurity of Wireless Networks -- Securing Business's Front Door: Password, Token and Biometric Authentication -- Managing Information Security Risks across the Enterprise -- Automatic Security Policy Management in Modern Networks: A New Approach to Security -- The Internal Revenue Service's Mission Assurance Program -- Organizing for Security -- About the Editors -- Index.
Summary Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
Notes Description based on print version record.
Other author Ghosh, Sumit, 1958-
Malek-Zavarei, Manu.
Stohr, Edward A., 1936-
Subject Business enterprises -- Computer networks -- Security measures -- Congresses.
Electronic commerce -- Security measures -- Congresses.
Computer networks -- Security measures -- Congresses.
Computer security -- Congresses.
Data protection -- Congresses.
Business enterprises -- Computer networks -- Security measures -- United States -- Congresses.
Electronic commerce -- United States -- Security measures -- Congresses.
Computer networks -- Security measures -- United States -- Congresses.
Computer security -- United States -- Congresses.
Data protection -- United States -- Congresses.
BUSINESS & ECONOMICS -- Workplace Culture.
BUSINESS & ECONOMICS -- Corporate Governance.
BUSINESS & ECONOMICS -- Leadership.
BUSINESS & ECONOMICS -- Organizational Development.
Business enterprises -- Computer networks -- Security measures.
Computer networks -- Security measures.
Computer security.
Data protection.
Electronic commerce -- Security measures.
Electronic books
Electronic books.
Conference proceedings.
ISBN 0306486385 (electronic bk.)
9780306486388 (electronic bk.)