Guarding your business : a management approach to security
(eBook)
Staff View
Grouping Information
Grouped Work ID | e830f395-3a57-b963-d495-b4d2c22bc40f-eng |
---|---|
Full title | guarding your business a management approach to security |
Author | sumit ghosh manu malek and edward a stohr |
Grouping Category | book |
Last Update | 2024-08-09 07:08:05AM |
Last Indexed | 2025-02-16 13:18:48PM |
Book Cover Information
Image Source | chilifresh |
---|---|
First Loaded | May 30, 2024 |
Last Used | Jan 27, 2025 |
Marc Record
First Detected | Jun 05, 2023 09:18:29 AM |
---|---|
Last File Modification Time | Aug 09, 2024 07:46:38 AM |
MARC Record
LEADER | 07689cam a2201009 a 4500 | ||
---|---|---|---|
001 | ocm55537711 | ||
003 | OCoLC | ||
005 | 20240523213016.0 | ||
006 | m d | ||
007 | cr cnu|||unuuu | ||
008 | 040603s2004 nyua ob 101 0 eng d | ||
010 | |z 2004044179 | ||
019 | |a 70740573|a 144560084|a 474871750|a 481610037|a 559918038|a 646737953|a 722389049|a 728034585|a 791628229|a 888500696|a 961643712|a 962649881|a 984848917|a 988434907|a 991906516|a 1020527713|a 1045491509|a 1053066950|a 1078833876|a 1097341819|a 1114432954|a 1391557618 | ||
020 | |a 0306486385|q (electronic bk.) | ||
020 | |a 9780306486388|q (electronic bk.) | ||
020 | |z 9780306484940 | ||
020 | |z 0306484943 | ||
035 | |a 109032|b (N$T) | ||
035 | |a (OCoLC)55537711|z (OCoLC)70740573|z (OCoLC)144560084|z (OCoLC)474871750|z (OCoLC)481610037|z (OCoLC)559918038|z (OCoLC)646737953|z (OCoLC)722389049|z (OCoLC)728034585|z (OCoLC)791628229|z (OCoLC)888500696|z (OCoLC)961643712|z (OCoLC)962649881|z (OCoLC)984848917|z (OCoLC)988434907|z (OCoLC)991906516|z (OCoLC)1020527713|z (OCoLC)1045491509|z (OCoLC)1053066950|z (OCoLC)1078833876|z (OCoLC)1097341819|z (OCoLC)1114432954|z (OCoLC)1391557618 | ||
040 | |a N$T|b eng|e pn|c N$T|d OCLCQ|d YDXCP|d OCLCG|d OCLCQ|d HNW|d OCLCA|d OCLCQ|d HNW|d TUU|d OCLCQ|d TULIB|d OCLCQ|d E7B|d GW5XE|d OCLCF|d DKDLA|d OCLCO|d OCLCQ|d MERUC|d CCO|d REDDC|d BTCTA|d CNMTR|d FVL|d COO|d OCLCO|d OCL|d OCLCO|d OCLCQ|d OCLCO|d SUR|d MOR|d PIFBR|d UAB|d OCLCQ|d WY@|d OCLCA|d ROC|d COD|d LUE|d RCC|d NRAMU|d OCLCQ|d INT|d TOF|d OCLCQ|d CANPU|d CNTRU|d OCLCQ|d BOL|d AJS|d OCLCQ|d OCLCO|d OCLCQ|d OCLCO|d OCLCQ|d IOY|d OCLCQ|d INARC|d OCLCQ|d OCLCO|d OCLCL | ||
043 | |a n-us--- | ||
049 | |a MAIN | ||
050 | 4 | |a HD30.38|b .M325 2002eb | |
072 | 7 | |a BUS|x 097000|2 bisacsh | |
072 | 7 | |a BUS|x 104000|2 bisacsh | |
072 | 7 | |a BUS|x 071000|2 bisacsh | |
072 | 7 | |a BUS|x 103000|2 bisacsh | |
082 | 0 | 4 | |a 658.4/78|2 22 |
111 | 2 | |a Management of Technology Symposium|d (2002 :|c Stevens Institute of Technology) | |
245 | 1 | 0 | |a Guarding your business :|b a management approach to security /|c edited by Sumit Ghosh, Manu Malek and Edward A. Stohr. |
260 | |a New York :|b Kluwer Academic/Plenum,|c ©2004. | ||
300 | |a 1 online resource (xiv, 252 pages) :|b illustrations | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
340 | |g polychrome.|2 rdacc|0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a text file|2 rdaft|0 http://rdaregistry.info/termList/fileType/1002 | ||
500 | |a "Proceedings of the Management of Technology (MOT) Symposium held at Stevens Institute of Technology during October 22-24, 2002"--Intord | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Security Principles for Managers -- The Fundamental Nature of Network Security -- Computer Security: Sophisticated Enemies -- Digital Pearl Harbor: A Case Study in Industry Vulnerability to Cyber Attack -- Cybercrime and the Law: Balancing Privacy against the Need for Security -- Some Security Issues and Concerns in the Financial Services Industry -- Security and Insecurity of Wireless Networks -- Securing Business's Front Door: Password, Token and Biometric Authentication -- Managing Information Security Risks across the Enterprise -- Automatic Security Policy Management in Modern Networks: A New Approach to Security -- The Internal Revenue Service's Mission Assurance Program -- Organizing for Security -- About the Editors -- Index. | |
520 | |a Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed? | ||
588 | 0 | |a Print version record. | |
590 | |a Added to collection customer.56279.3 | ||
650 | 0 | |a Business enterprises|x Computer networks|x Security measures|v Congresses. | |
650 | 0 | |a Electronic commerce|x Security measures|v Congresses. | |
650 | 0 | |a Computer networks|x Security measures|v Congresses. | |
650 | 0 | |a Computer security|v Congresses. | |
650 | 0 | |a Data protection|v Congresses. | |
650 | 0 | |a Business enterprises|x Computer networks|x Security measures|z United States|v Congresses. | |
650 | 0 | |a Electronic commerce|x Security measures|z United States|v Congresses. | |
650 | 0 | |a Computer networks|x Security measures|z United States|v Congresses. | |
650 | 0 | |a Computer security|z United States|v Congresses. | |
650 | 0 | |a Data protection|z United States|v Congresses. | |
650 | 6 | |a Commerce électronique|x Sécurité|x Mesures|v Congrès. | |
650 | 6 | |a Réseaux d'ordinateurs|x Sécurité|x Mesures|v Congrès. | |
650 | 6 | |a Sécurité informatique|v Congrès. | |
650 | 6 | |a Protection de l'information (Informatique)|v Congrès. | |
650 | 6 | |a Commerce électronique|x Sécurité|x Mesures|z États-Unis|v Congrès. | |
650 | 6 | |a Réseaux d'ordinateurs|x Sécurité|x Mesures|z États-Unis|v Congrès. | |
650 | 6 | |a Sécurité informatique|z États-Unis|v Congrès. | |
650 | 6 | |a Protection de l'information (Informatique)|z États-Unis|v Congrès. | |
650 | 7 | |a BUSINESS & ECONOMICS|x Workplace Culture.|2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS|x Corporate Governance.|2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS|x Leadership.|2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS|x Organizational Development.|2 bisacsh | |
650 | 7 | |a Business enterprises|x Computer networks|x Security measures|2 fast | |
650 | 7 | |a Computer networks|x Security measures|2 fast | |
650 | 7 | |a Computer security|2 fast | |
650 | 7 | |a Data protection|2 fast | |
650 | 7 | |a Electronic commerce|x Security measures|2 fast | |
651 | 7 | |a United States|2 fast|1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
655 | 7 | |a proceedings (reports)|2 aat | |
655 | 7 | |a Conference papers and proceedings|2 fast | |
655 | 7 | |a Conference papers and proceedings.|2 lcgft | |
655 | 7 | |a Actes de congrès.|2 rvmgf | |
700 | 1 | |a Ghosh, Sumit,|d 1958-|1 https://id.oclc.org/worldcat/entity/E39PCjBFWPCrQ6rCKMY3wwhJXd | |
700 | 1 | |a Malek-Zavarei, Manu. | |
700 | 1 | |a Stohr, Edward A.,|d 1936-|1 https://id.oclc.org/worldcat/entity/E39PCjrXCvjCqXRWkCfxt39Dhd | |
758 | |i has work:|a Guarding your business (Text)|1 https://id.oclc.org/worldcat/entity/E39PCGbtMR4VtTxV9kCV7FP98P|4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version:|a Management of Technology Symposium (2002 : Stevens Institute of Technology).|t Guarding your business.|d New York : Kluwer Academic/Plenum, 2004|z 0306484943|w (DLC) 2004044179|w (OCoLC)54392281 |
856 | 4 | 0 | |3 EBSCOhost|u https://emil.mlc-wels.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=109032 |
938 | |a Baker and Taylor|b BTCP|n BK0006233630 | ||
938 | |a ebrary|b EBRY|n ebr10088548 | ||
938 | |a EBSCOhost|b EBSC|n 109032 | ||
938 | |a YBP Library Services|b YANK|n 2292692 | ||
938 | |a Internet Archive|b INAR|n guardingyourbusi0000mana | ||
994 | |a 92|b N$T |
Description
More Details
Notes
Subjects
Business enterprises -- Computer networks -- Security measures -- United States -- Congresses.
Computer networks -- Security measures -- Congresses.
Computer networks -- Security measures -- United States -- Congresses.
Computer security -- Congresses.
Computer security -- United States -- Congresses.
Conference papers and proceedings.
Data protection -- Congresses.
Data protection -- United States -- Congresses.
Electronic commerce -- Security measures -- Congresses.
Electronic commerce -- Security measures -- United States -- Congresses.
Commerce électronique -- Sécurité -- Mesures -- Congrès.
Commerce électronique -- Sécurité -- Mesures -- États-Unis -- Congrès.
proceedings (reports)
Protection de l'information (Informatique) -- Congrès.
Protection de l'information (Informatique) -- États-Unis -- Congrès.
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès.
Réseaux d'ordinateurs -- Sécurité -- Mesures -- États-Unis -- Congrès.
Sécurité informatique -- Congrès.
Sécurité informatique -- États-Unis -- Congrès.
Reviews from GoodReads
Citations
Ghosh, S., Malek-Zavarei, M., & Stohr, E. A. (2004). Guarding your business: a management approach to security . Kluwer Academic/Plenum.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Ghosh, Sumit, 1958-, Manu. Malek-Zavarei and Edward A. Stohr. 2004. Guarding Your Business: A Management Approach to Security. New York: Kluwer Academic/Plenum.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Ghosh, Sumit, 1958-, Manu. Malek-Zavarei and Edward A. Stohr. Guarding Your Business: A Management Approach to Security New York: Kluwer Academic/Plenum, 2004.
Harvard Citation (style guide)Ghosh, S., Malek-Zavarei, M. and Stohr, E. A. (2004). Guarding your business: a management approach to security. New York: Kluwer Academic/Plenum.
MLA Citation, 9th Edition (style guide)Ghosh, Sumit, Manu Malek-Zavarei, and Edward A. Stohr. Guarding Your Business: A Management Approach to Security Kluwer Academic/Plenum, 2004.