0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Information Security - Policy, Processes, and Practices (Paperback): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Paperback)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R1,655 Discovery Miles 16 550 Ships in 12 - 17 working days

Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.

Information Security - Policy, Processes, and Practices (Hardcover): Seymour Goodman, Detmar W Straub, Richard Baskerville Information Security - Policy, Processes, and Practices (Hardcover)
Seymour Goodman, Detmar W Straub, Richard Baskerville
R4,424 Discovery Miles 44 240 Ships in 12 - 17 working days

Edited by Straub (information systems, Georgia State U.), Goodman (international affairs and computing, Georgia Institute of Technology), and Baskerville (information systems, Robinson College of Business), this volume of Advances in Management Information Systems is the first of several to address issues of information security and as such it focuses on matters of policy, strategy, and processes necessary for the establishment of the overall security posture of an organization and leaves discussion of supportive technological and organizational measures for later volumes. Chapters address information technology governance and organizational design for security management, information system risk assessment and documentation, strategic information security risk management, and business continuity planning and the protection of informational assets. They also discuss the extra-organizational security setting for the United States and internationally, as well as emerging research trends.

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Hardcover, 1st Edition.
2nd Printing. 2008): Michael Portnoy,... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Hardcover, 1st Edition. 2nd Printing. 2008)
Michael Portnoy, Seymour Goodman
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michael Portnoy, Seymour Goodman
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Cadac 47cm Paella Pan
R1,215 Discovery Miles 12 150
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Bostik Crystal Clear Tape
R43 Discovery Miles 430
Cadac Cadac Swivel Regulator (B/P)
R219 R198 Discovery Miles 1 980
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bantex @School White Glue with…
 (1)
R12 Discovery Miles 120
Dog's Life Calming Cuddler (Grey…
R450 R312 Discovery Miles 3 120
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Motoquip Battery Operated Cob Worklight
R299 R251 Discovery Miles 2 510

 

Partners