0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Information Security - Policy, Processes, and Practices (Paperback): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Paperback)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.

Information Security - Policy, Processes, and Practices (Hardcover): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Hardcover)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R4,648 Discovery Miles 46 480 Ships in 10 - 15 working days

Edited by Straub (information systems, Georgia State U.), Goodman (international affairs and computing, Georgia Institute of Technology), and Baskerville (information systems, Robinson College of Business), this volume of Advances in Management Information Systems is the first of several to address issues of information security and as such it focuses on matters of policy, strategy, and processes necessary for the establishment of the overall security posture of an organization and leaves discussion of supportive technological and organizational measures for later volumes. Chapters address information technology governance and organizational design for security management, information system risk assessment and documentation, strategic information security risk management, and business continuity planning and the protection of informational assets. They also discuss the extra-organizational security setting for the United States and internationally, as well as emerging research trends.

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Hardcover, 1st Edition.
2nd Printing. 2008): Michael Portnoy,... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Hardcover, 1st Edition. 2nd Printing. 2008)
Michael Portnoy, Seymour Goodman
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michael Portnoy, Seymour Goodman
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Thursday Murder Club
Richard Osman Paperback  (2)
R275 R254 Discovery Miles 2 540
Forgotten In Death
J. D. Robb Paperback R372 R338 Discovery Miles 3 380
Twelve Secrets
Robert Gold Paperback R391 R361 Discovery Miles 3 610
Someone You Trust
Rachel Ryan Paperback R434 R395 Discovery Miles 3 950
Bloedbande
Jeanette Stals Paperback R320 R300 Discovery Miles 3 000
The Kingdom
Jo Nesbo Paperback  (1)
R371 Discovery Miles 3 710
Leo
Deon Meyer Paperback  (2)
R442 R406 Discovery Miles 4 060
Red Tide
Irma Venter Paperback R350 R312 Discovery Miles 3 120
Die Wet Van Gauteng
Hannes Barnard Paperback R370 R330 Discovery Miles 3 300
The Case Against William
Mark Gimenez Paperback  (1)
R290 R264 Discovery Miles 2 640

 

Partners