Information security: Setting the boardroon agenda
Author :
Publisher : Grist Ltd
Page : 61 pages
File Size : 47,20 MB
Release : 2003
Category :
ISBN : 0954279913
Author :
Publisher : Grist Ltd
Page : 61 pages
File Size : 47,20 MB
Release : 2003
Category :
ISBN : 0954279913
Author : Paul Dowland
Publisher : Lulu.com
Page : 129 pages
File Size : 22,28 MB
Release : 2008
Category : Computer security
ISBN : 3901882316
Author : S.H. Solms
Publisher : Springer Science & Business Media
Page : 141 pages
File Size : 50,33 MB
Release : 2008-12-16
Category : Business & Economics
ISBN : 0387799842
IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry.
Author : Rao, H.R.
Publisher : IGI Global
Page : 346 pages
File Size : 15,90 MB
Release : 2007-06-30
Category : Computers
ISBN : 1599041731
"This book provides high-quality research papers and industrial practice articles about information security in the financial service industry. It provides insight into current information security measures, including: technology, processes, and compliance from some of the leading researchers and practitioners in the field"--Provided by publisher.
Author :
Publisher : Grist Ltd
Page : 88 pages
File Size : 29,27 MB
Release :
Category :
ISBN : 0954279980
Author : Bessis, Nik
Publisher : IGI Global
Page : 360 pages
File Size : 24,30 MB
Release : 2009-05-31
Category : Education
ISBN : 1605663654
"This book presents research on building network of excellence by effectively and efficiently managing ICT-related resources using Grid technology"--Provided by publisher.
Author : Todd Fitzgerald
Publisher : CRC Press
Page : 435 pages
File Size : 47,2 MB
Release : 2016-04-19
Category : Business & Economics
ISBN : 1466551283
Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is protected and examines all positions from the board of directors to the end user, delineating the role each plays in protecting the security of the organization.
Author : Management Association, Information Resources
Publisher : IGI Global
Page : 1706 pages
File Size : 23,45 MB
Release : 2015-02-28
Category : Computers
ISBN : 1466681128
Effective communication requires a common language, a truth that applies to science and mathematics as much as it does to culture and conversation. Standards and Standardization: Concepts, Methodologies, Tools, and Applications addresses the necessity of a common system of measurement in all technical communications and endeavors, in addition to the need for common rules and guidelines for regulating such enterprises. This multivolume reference will be of practical and theoretical significance to researchers, scientists, engineers, teachers, and students in a wide array of disciplines.
Author : Seymour Bosworth
Publisher : John Wiley & Sons
Page : 2034 pages
File Size : 41,50 MB
Release : 2012-07-18
Category : Computers
ISBN : 0470413743
The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC). Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including: 1. Hardware Elements of Security 2. Fundamentals of Cryptography and Steganography 3. Mathematical models of information security 4. Insider threats 5. Social engineering and low-tech attacks 6. Spam, phishing, and Trojans: attacks meant to fool 7. Biometric authentication 8. VPNs and secure remote access 9. Securing Peer2Peer, IM, SMS, and collaboration tools 10. U.S. legal and regulatory security issues, such as GLBA and SOX Whether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook, Fifth Edition equips you to protect the information and networks that are vital to your organization.
Author : Lee Parrish
Publisher : CRC Press
Page : 185 pages
File Size : 36,33 MB
Release : 2024-07-18
Category : Computers
ISBN : 1040051693
Independent directors of corporate boards understand the importance of cyber security as a business issue. Increased regulatory requirements, the onslaught of breaches, as well as the replacement of the corporate network perimeter with more third-party partnerships have all contributed to cyber security rising to the top of enterprise risks. Yet, many directors only receive a few brief cyber security updates during the year. Moreover, many directors have devoted their careers to other important business disciplines and may not fully grasp the technical concepts of cyber security. The challenge is that many publications on board cyber security governance address the topic at such a high level that it removes the important context of the cyber security details—or covers the topic too deeply with hard-to-understand technical language. These resources may often provide lists of security questions for directors to ask of their management team, but they do not provide the answers to the questions so that actionable oversight can be performed. What I would have wanted, and why you are probably reading this book summary, is a resource that delivers the questions to ask but also provides the answers and in a narrative, easy-to-understand style. An award-winning Chief Information Security Officer with over two decades of working with multiple Fortune 500 boards, Lee Parrish provides an example-laden vision to improve cyber security governance in the boardroom. Additionally, Lee deciphers the technical jargon to increase the reader’s cyber fluency—not to make you a cyber expert but to help you be able to ask direct questions, understand the answers provided, challenge strategies, and advise on important cyber decisions. Pick up your copy of The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security today and start your journey on achieving more effective cyber security oversight. Want to learn more? Please visit www.novelsecurity.com