This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective ofhackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue.This book covers the entire range of best security practices—obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics.For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.
"synopsis" may belong to another edition of this title.
£ 6.39 shipping from U.S.A. to United Kingdom
Destination, rates & speeds£ 10.11 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: unifachbuch e.K., Köln, NRW, Germany
Taschenbuch. Condition: Neu. Gebraucht - Wie neu Ungelesenes, vollständiges Exemplar in sehr gutem Zustand. Abzugsfähige Rechnung. -This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of 'hackers' (i.e., technology issues and defenses) and 'lawyers' (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices--obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program. 275 pp. Deutsch. Seller Inventory # INF1000061692
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 0.95. Seller Inventory # G0131840274I3N00
Quantity: 1 available
Seller: SGS Trading Inc, Franklin Lakes, NJ, U.S.A.
Paperback. Condition: Good. Textbook, May Have Highlights, Notes and/or Underlining, BOOK ONLY-NO ACCESS CODE, NO CD, Ships with Tracking. Seller Inventory # SKU0209243
Quantity: 2 available
Seller: dsmbooks, Liverpool, United Kingdom
Paperback. Condition: Good. Good. book. Seller Inventory # D7S9-1-M-0131840274-2
Quantity: 1 available