Protecting Business Information: A Manager's Guide / Edition 1

Protecting Business Information: A Manager's Guide / Edition 1

by James A Schweitzer
ISBN-10:
0750696583
ISBN-13:
9780750696586
Pub. Date:
11/09/1995
Publisher:
Elsevier Science
ISBN-10:
0750696583
ISBN-13:
9780750696586
Pub. Date:
11/09/1995
Publisher:
Elsevier Science
Protecting Business Information: A Manager's Guide / Edition 1

Protecting Business Information: A Manager's Guide / Edition 1

by James A Schweitzer

Hardcover

$72.95 Current price is , Original price is $72.95. You
$72.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Protecting Business Information: A Manager's guide is an introduction to the information resource, its sensitivity, value and susceptibility to risk. This book provides an outline for a business information security program and provides clear answers to the why and how of information protection.

Protecting Business Information' provides detailed processes for analysis, leading to a complete and adequate information classification. It includes a thorough description of the methods for information classification.


Product Details

ISBN-13: 9780750696586
Publisher: Elsevier Science
Publication date: 11/09/1995
Pages: 199
Product dimensions: 6.00(w) x 9.00(h) x (d)

Table of Contents

Part I - THE CASE FOR INFORMATION SECURITY 1. Some Background on Information Protection 2. The Management Issue: Why bother with Information Security? 3. Information Threats and Vunerabilities

Part II - PROTECTION OF INFORMATION:CONCEPTS AND METHODS 4. Information Concepts 5. Establishing Proprietary Rights to Information 6. Information Protection Methods 7. Securing the Information Environments 8. Computer Security 9. Communications Security

Part III - INFORMATION SECURITY MANAGEMENT 10. Information Security in the Business Enterprise 11. Relating Information Security Investment to Business Needs 12. Information Security Directives 13. Setting Up the Information Security Program 14. Administration and Maintenance of Information Security

Part IV - A COMPENDIUM OF TERMS WITH ISSUES, CONCERNS, AND SOLUTIONS

From the B&N Reads Blog

Customer Reviews