0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Information Security - Policy, Processes, and Practices (Paperback): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Paperback)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R1,616 Discovery Miles 16 160 Ships in 12 - 17 working days

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.

Information Security - Policy, Processes, and Practices (Hardcover): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Hardcover)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R4,317 Discovery Miles 43 170 Ships in 12 - 17 working days

Edited by Straub (information systems, Georgia State U.), Goodman (international affairs and computing, Georgia Institute of Technology), and Baskerville (information systems, Robinson College of Business), this volume of Advances in Management Information Systems is the first of several to address issues of information security and as such it focuses on matters of policy, strategy, and processes necessary for the establishment of the overall security posture of an organization and leaves discussion of supportive technological and organizational measures for later volumes. Chapters address information technology governance and organizational design for security management, information system risk assessment and documentation, strategic information security risk management, and business continuity planning and the protection of informational assets. They also discuss the extra-organizational security setting for the United States and internationally, as well as emerging research trends.

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Hardcover, 1st Edition.
2nd Printing. 2008): Michael Portnoy,... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Hardcover, 1st Edition. 2nd Printing. 2008)
Michael Portnoy, Seymour Goodman
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michael Portnoy, Seymour Goodman
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Huntlea Original Two Tone Pillow Bed…
R650 R565 Discovery Miles 5 650
CritiCare® Sterile Gauze Swabs (75 x 75…
R3 Discovery Miles 30
Parallel Mothers
Pedro Almodovar DVD R133 Discovery Miles 1 330
Labour Relations in South Africa
Dr Hanneli Bendeman, Dr Bronwyn Dworzanowski-Venter Paperback R658 R550 Discovery Miles 5 500
Vital Baby® HYGIENE™ Super Soft Hand…
R45 Discovery Miles 450
Home Quip Stainless Steel Double Wall…
R181 R155 Discovery Miles 1 550
Elektra Health 8076 Electrode Hot Steam…
 (14)
R580 R474 Discovery Miles 4 740
Slippers
R57 Discovery Miles 570
Sing 2
Blu-ray disc R210 Discovery Miles 2 100
Huntlea Original Memory Foam Mattress…
R999 R559 Discovery Miles 5 590

 

Partners