Books > Computing & IT > Computer communications & networking
|
Buy Now
Securing E-Business Systems - A Guide for Managers and Executives (Paperback)
Loot Price: R768
Discovery Miles 7 680
You Save: R251
(25%)
|
|
Securing E-Business Systems - A Guide for Managers and Executives (Paperback)
Expected to ship within 12 - 17 working days
|
"This is a must-read for the entire CXO community if businesses are
to survive in cyberspace. Attack methodologies and the cyber threat
poised against our business systems are advancing rapidly. Business
leaders are soon to face downstream liability issues for the damage
their unprotected and exploited systems cause not only to
themselves but to all of those with whom they do business in
cyberspace. American businesses are now the target of choice by our
nation's enemies. We may secure the airways, ports, and borders,
but only the boardrooms of America can ensure the survival of our
economy." John R. Thomas, Colonel, U.S. Army, Retired Former
Commander of the DoD, Global Operations and Security Center Today's
e-business depends on the security of its networks and information
technology infrastructure to safeguard its customers and its
profits. But with rapid innovation and the emergence of new threats
and new countermeasures, keeping up with security is becoming more
complex than ever. Securing E-Business Systems offers a new model
for developing a proactive program of security administration that
works as a continuous process of identifying weaknesses and
implementing solutions. This book offers a real, working design for
managing an IT security program with the attention it truly
warrants, treating security as a constant function that adapts
tomeet a company's changing security needs. Topics include:
Security weaknesses Safeguarding technologies Countermeasure best
practices Establishing an adaptable e-business security management
program Essential elements of a corporate security management
program Functions, structure, staffing, and contracting
considerations in security management Implementing intrusion
detection technology Designing tomorrow's e-business application
for secured operations Contemporary rationales for justifying
increased spending on security programs Emerging liability issues
for e-businesses
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.