Fr. 60.50

Securing E-Business Systems - A Guide for Managers and Executives

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Zusatztext "...to be recommended as a as an IT security handbook..." (Information Age! August 2002) Informationen zum Autor TIMOTHY BRAITHWAITE has spent more than fifteen years in senior security management positions and another twenty years in executive director positions for computer and communications services organizations in both the public and private sectors. He has also worked as a private consultant. Tim has previously published The Power of IT: Maximizing Your Technology Investments and Evaluating the Year 2000 Project: A Management Guide for Determining Reasonable Care (Wiley). Klappentext The essential guide to e-business security for managers and IT professionalsSecuring E-Business Systems provides business managers and executives with an overview of the components of an effective e-business infrastructure, the areas of greatest risk, and best practices safeguards. It outlines a security strategy that allows the identification of new vulnerabilities, assists in rapid safeguard deployment, and provides for continuous safeguard evaluation and modification. The book thoroughly outlines a proactive and evolving security strategy and provides a methodology for ensuring that applications are designed with security in mind. It discusses emerging liabilities issues and includes security best practices, guidelines, and sample policies. This is the bible of e-business security.Timothy Braithwaite (Columbus, MD) is Deputy Director of Information Assurance Programs for Titan Corporation. He has managed data centers, software projects, systems planning, and budgeting organizations, and has extensive experience in project and acquisition management. He is also the author of Y2K Lessons Learned (Wiley: 0-471-37308-7). Zusammenfassung The essential guide to e-business security for managers and IT professionals Securing E-Business Systems provides business managers and executives with an overview of the components of an effective e-business infrastructure, the areas of greatest risk, and best practices safeguards. Inhaltsverzeichnis Preface. Chapter 1 Electronic Business Systems Security. Introduction. How Is E-Business Security Defined? Can E-Business Security Be Explained More Simply? Is E-Business Security Really Such a Big Deal? Is E-Business Security More Important Than Other Information Technology Initiatives? How Does an Organization Get Started? Instead of Playing "Catch-Up," What Should an Organization Be Doing to Design E-Business Systems That Are Secure in the First Place? Chapter 2 E-Business Systems and Infrastructure Support Issues. Introduction. E-Business Defined. A Short History of E-Business Innovations. The Need for Secure E-Business Systems. Software: The Vulnerable Underbelly of Computing. The Interoperability Challenge and E-Business Success. E-Business Security: An Exercise in Trade-Offs. Few Systems Are Designed to Be Secure. Conclusion. Chapter 3 Security Weaknesses in E-Business Infrastructure and "Best Practices" Security. Introduction. Fundamental Technical Security Threats. The Guiding Principles of Protection. "Best Practice" Prevention, Detection, and Countermeasures and Recovery Techniques. x Chapter 4 Managing E-Business Systems and Security. Introduction. Part One: Misconceptions and Questionable Assumptions. Part Two: Managing E-Business Systems as a Corporate Asset. Part Three: E-Business Security Program Management. Chapter 5 A "Just-in-Time" Strategy for Securing the E-Business System: The Role for Security Monitoring and Incident Response. The Current State of E-Business Security. Standard Requirem...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.