Guarding your business : a management approach to security
(eBook)

Book Cover
Average Rating
Published
New York : Kluwer Academic/Plenum, ©2004.
Format
eBook
ISBN
0306486385, 9780306486388
Physical Desc
1 online resource (xiv, 252 pages) : illustrations
Status

Staff View

Grouped Work ID
e830f395-3a57-b963-d495-b4d2c22bc40f-eng
Go To Grouped Work

Grouping Information

Grouped Work IDe830f395-3a57-b963-d495-b4d2c22bc40f-eng
Full titleguarding your business a management approach to security
Authorsumit ghosh manu malek and edward a stohr
Grouping Categorybook
Last Update2024-08-09 07:08:05AM
Last Indexed2025-02-16 13:18:48PM

Book Cover Information

Image Sourcechilifresh
First LoadedMay 30, 2024
Last UsedJan 27, 2025

Marc Record

First DetectedJun 05, 2023 09:18:29 AM
Last File Modification TimeAug 09, 2024 07:46:38 AM

MARC Record

LEADER07689cam a2201009 a 4500
001ocm55537711 
003OCoLC
00520240523213016.0
006m        d        
007cr cnu|||unuuu
008040603s2004    nyua    ob    101 0 eng d
010 |z  2004044179
019 |a 70740573|a 144560084|a 474871750|a 481610037|a 559918038|a 646737953|a 722389049|a 728034585|a 791628229|a 888500696|a 961643712|a 962649881|a 984848917|a 988434907|a 991906516|a 1020527713|a 1045491509|a 1053066950|a 1078833876|a 1097341819|a 1114432954|a 1391557618
020 |a 0306486385|q (electronic bk.)
020 |a 9780306486388|q (electronic bk.)
020 |z 9780306484940
020 |z 0306484943
035 |a 109032|b (N$T)
035 |a (OCoLC)55537711|z (OCoLC)70740573|z (OCoLC)144560084|z (OCoLC)474871750|z (OCoLC)481610037|z (OCoLC)559918038|z (OCoLC)646737953|z (OCoLC)722389049|z (OCoLC)728034585|z (OCoLC)791628229|z (OCoLC)888500696|z (OCoLC)961643712|z (OCoLC)962649881|z (OCoLC)984848917|z (OCoLC)988434907|z (OCoLC)991906516|z (OCoLC)1020527713|z (OCoLC)1045491509|z (OCoLC)1053066950|z (OCoLC)1078833876|z (OCoLC)1097341819|z (OCoLC)1114432954|z (OCoLC)1391557618
040 |a N$T|b eng|e pn|c N$T|d OCLCQ|d YDXCP|d OCLCG|d OCLCQ|d HNW|d OCLCA|d OCLCQ|d HNW|d TUU|d OCLCQ|d TULIB|d OCLCQ|d E7B|d GW5XE|d OCLCF|d DKDLA|d OCLCO|d OCLCQ|d MERUC|d CCO|d REDDC|d BTCTA|d CNMTR|d FVL|d COO|d OCLCO|d OCL|d OCLCO|d OCLCQ|d OCLCO|d SUR|d MOR|d PIFBR|d UAB|d OCLCQ|d WY@|d OCLCA|d ROC|d COD|d LUE|d RCC|d NRAMU|d OCLCQ|d INT|d TOF|d OCLCQ|d CANPU|d CNTRU|d OCLCQ|d BOL|d AJS|d OCLCQ|d OCLCO|d OCLCQ|d OCLCO|d OCLCQ|d IOY|d OCLCQ|d INARC|d OCLCQ|d OCLCO|d OCLCL
043 |a n-us---
049 |a MAIN
050 4|a HD30.38|b .M325 2002eb
072 7|a BUS|x 097000|2 bisacsh
072 7|a BUS|x 104000|2 bisacsh
072 7|a BUS|x 071000|2 bisacsh
072 7|a BUS|x 103000|2 bisacsh
08204|a 658.4/78|2 22
1112 |a Management of Technology Symposium|d (2002 :|c Stevens Institute of Technology)
24510|a Guarding your business :|b a management approach to security /|c edited by Sumit Ghosh, Manu Malek and Edward A. Stohr.
260 |a New York :|b Kluwer Academic/Plenum,|c ©2004.
300 |a 1 online resource (xiv, 252 pages) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
340 |g polychrome.|2 rdacc|0 http://rdaregistry.info/termList/RDAColourContent/1003
347 |a text file|2 rdaft|0 http://rdaregistry.info/termList/fileType/1002
500 |a "Proceedings of the Management of Technology (MOT) Symposium held at Stevens Institute of Technology during October 22-24, 2002"--Intord
504 |a Includes bibliographical references and index.
5050 |a Security Principles for Managers -- The Fundamental Nature of Network Security -- Computer Security: Sophisticated Enemies -- Digital Pearl Harbor: A Case Study in Industry Vulnerability to Cyber Attack -- Cybercrime and the Law: Balancing Privacy against the Need for Security -- Some Security Issues and Concerns in the Financial Services Industry -- Security and Insecurity of Wireless Networks -- Securing Business's Front Door: Password, Token and Biometric Authentication -- Managing Information Security Risks across the Enterprise -- Automatic Security Policy Management in Modern Networks: A New Approach to Security -- The Internal Revenue Service's Mission Assurance Program -- Organizing for Security -- About the Editors -- Index.
520 |a Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
5880 |a Print version record.
590 |a Added to collection customer.56279.3
650 0|a Business enterprises|x Computer networks|x Security measures|v Congresses.
650 0|a Electronic commerce|x Security measures|v Congresses.
650 0|a Computer networks|x Security measures|v Congresses.
650 0|a Computer security|v Congresses.
650 0|a Data protection|v Congresses.
650 0|a Business enterprises|x Computer networks|x Security measures|z United States|v Congresses.
650 0|a Electronic commerce|x Security measures|z United States|v Congresses.
650 0|a Computer networks|x Security measures|z United States|v Congresses.
650 0|a Computer security|z United States|v Congresses.
650 0|a Data protection|z United States|v Congresses.
650 6|a Commerce électronique|x Sécurité|x Mesures|v Congrès.
650 6|a Réseaux d'ordinateurs|x Sécurité|x Mesures|v Congrès.
650 6|a Sécurité informatique|v Congrès.
650 6|a Protection de l'information (Informatique)|v Congrès.
650 6|a Commerce électronique|x Sécurité|x Mesures|z États-Unis|v Congrès.
650 6|a Réseaux d'ordinateurs|x Sécurité|x Mesures|z États-Unis|v Congrès.
650 6|a Sécurité informatique|z États-Unis|v Congrès.
650 6|a Protection de l'information (Informatique)|z États-Unis|v Congrès.
650 7|a BUSINESS & ECONOMICS|x Workplace Culture.|2 bisacsh
650 7|a BUSINESS & ECONOMICS|x Corporate Governance.|2 bisacsh
650 7|a BUSINESS & ECONOMICS|x Leadership.|2 bisacsh
650 7|a BUSINESS & ECONOMICS|x Organizational Development.|2 bisacsh
650 7|a Business enterprises|x Computer networks|x Security measures|2 fast
650 7|a Computer networks|x Security measures|2 fast
650 7|a Computer security|2 fast
650 7|a Data protection|2 fast
650 7|a Electronic commerce|x Security measures|2 fast
651 7|a United States|2 fast|1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
655 7|a proceedings (reports)|2 aat
655 7|a Conference papers and proceedings|2 fast
655 7|a Conference papers and proceedings.|2 lcgft
655 7|a Actes de congrès.|2 rvmgf
7001 |a Ghosh, Sumit,|d 1958-|1 https://id.oclc.org/worldcat/entity/E39PCjBFWPCrQ6rCKMY3wwhJXd
7001 |a Malek-Zavarei, Manu.
7001 |a Stohr, Edward A.,|d 1936-|1 https://id.oclc.org/worldcat/entity/E39PCjrXCvjCqXRWkCfxt39Dhd
758 |i has work:|a Guarding your business (Text)|1 https://id.oclc.org/worldcat/entity/E39PCGbtMR4VtTxV9kCV7FP98P|4 https://id.oclc.org/worldcat/ontology/hasWork
77608|i Print version:|a Management of Technology Symposium (2002 : Stevens Institute of Technology).|t Guarding your business.|d New York : Kluwer Academic/Plenum, 2004|z 0306484943|w (DLC) 2004044179|w (OCoLC)54392281
85640|3 EBSCOhost|u https://emil.mlc-wels.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=109032
938 |a Baker and Taylor|b BTCP|n BK0006233630
938 |a ebrary|b EBRY|n ebr10088548
938 |a EBSCOhost|b EBSC|n 109032
938 |a YBP Library Services|b YANK|n 2292692
938 |a Internet Archive|b INAR|n guardingyourbusi0000mana
994 |a 92|b N$T

Description

Loading Description...

More Details

Language
English

Notes

General Note
"Proceedings of the Management of Technology (MOT) Symposium held at Stevens Institute of Technology during October 22-24, 2002"--Intord
Bibliography
Includes bibliographical references and index.
Description
Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?
Local note
Added to collection customer.56279.3

Reviews from GoodReads

Loading GoodReads Reviews.

More Like This

Loading more titles like this title...

Citations

APA Citation, 7th Edition (style guide)

Ghosh, S., Malek-Zavarei, M., & Stohr, E. A. (2004). Guarding your business: a management approach to security . Kluwer Academic/Plenum.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Ghosh, Sumit, 1958-, Manu. Malek-Zavarei and Edward A. Stohr. 2004. Guarding Your Business: A Management Approach to Security. New York: Kluwer Academic/Plenum.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Ghosh, Sumit, 1958-, Manu. Malek-Zavarei and Edward A. Stohr. Guarding Your Business: A Management Approach to Security New York: Kluwer Academic/Plenum, 2004.

Harvard Citation (style guide)

Ghosh, S., Malek-Zavarei, M. and Stohr, E. A. (2004). Guarding your business: a management approach to security. New York: Kluwer Academic/Plenum.

MLA Citation, 9th Edition (style guide)

Ghosh, Sumit, Manu Malek-Zavarei, and Edward A. Stohr. Guarding Your Business: A Management Approach to Security Kluwer Academic/Plenum, 2004.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.