The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes; impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus, new social and technical security controls are imperative in this revolution. This book therefore provides means for evaluation, formation and implementation of ICT security controls. The Social- Technical ICT Security Readiness Checklist can be helpful in managing the risks that ICT presents. Also the challenges of the process of computerisation and other changes due to ICT are investigated in the book from a security point of view.The checklist would serve as a starting point in assisting organizations to meet the security challenges of exploiting the benefits of ICT.
"synopsis" may belong to another edition of this title.
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes; impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus, new social and technical security controls are imperative in this revolution. This book therefore provides means for evaluation, formation and implementation of ICT security controls. The Social- Technical ICT Security Readiness Checklist can be helpful in managing the risks that ICT presents. Also the challenges of the process of computerisation and other changes due to ICT are investigated in the book from a security point of view.The checklist would serve as a starting point in assisting organizations to meet the security challenges of exploiting the benefits of ICT. 280 pp. Englisch. Seller Inventory # 9783838342825
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes impacting the way we work,. Seller Inventory # 5414771
Quantity: Over 20 available
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. ICT Security Readiness Checklist for Developing Countries | A Social Technical Approach to ICT Security Controls | Charles Ndekarisho Tarimo | Taschenbuch | 280 S. | Englisch | 2010 | LAP LAMBERT Academic Publishing | EAN 9783838342825 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Seller Inventory # 101216777
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes; impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus, new social and technical security controls are imperative in this revolution. This book therefore provides means for evaluation, formation and implementation of ICT security controls. The Social- Technical ICT Security Readiness Checklist can be helpful in managing the risks that ICT presents. Also the challenges of the process of computerisation and other changes due to ICT are investigated in the book from a security point of view.The checklist would serve as a starting point in assisting organizations to meet the security challenges of exploiting the benefits of ICT.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 280 pp. Englisch. Seller Inventory # 9783838342825
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes; impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus, new social and technical security controls are imperative in this revolution. This book therefore provides means for evaluation, formation and implementation of ICT security controls. The Social- Technical ICT Security Readiness Checklist can be helpful in managing the risks that ICT presents. Also the challenges of the process of computerisation and other changes due to ICT are investigated in the book from a security point of view.The checklist would serve as a starting point in assisting organizations to meet the security challenges of exploiting the benefits of ICT. Seller Inventory # 9783838342825