search for books and compare prices
business enterprises computer networks security measures matches 17 work(s)
displaying 1 to 17 | at end
show results in order: alphabetically | oldest to newest | newest to oldest
Cover for 9781472466730 Cover for 9781413309263 Cover for 9781413318432 Cover for 9781413321128 Cover for 9781472432094 Cover for 9781118836354 Cover for 9781118810118 Cover for 9781466584303 Cover for 9781413313260 Cover for 9781439881521 Cover for 9780132742931 Cover for 9780133544015 Cover for 9780749464851 Cover for 9780749474058 Cover for 9781592293841 Cover for 9781439868348 Cover for 9780071769051 Cover for 9780470874745 Cover for 9781605668062 Cover for 9780738432458 Cover for 9780471072980 Cover for 9781119090939 Cover for 9780471423249
cover image for 9781413321128
Product Description: Make Your Workplace Safe for Technology Worried that your company’s employees might post trade secrets on Facebook, send harassing email, or text while driving on company business? Advances in workplace technology bring big benefits, but they can also bring legal exposure...read more

Paperback:

9781413321128, titled "Smart Policies for Workplace Technologies: Email, Blogs, Cell Phones & More" | 4th edition (Nolo, January 26, 2015), cover price $34.99 | About this edition: Make Your Workplace Safe for Technology Worried that your company’s employees might post trade secrets on Facebook, send harassing email, or text while driving on company business?
9781413318432, titled "Smart Policies for Workplace Technologies: Email, Blogs, Cell Phones & More" | 3 pap/cdr edition (Nolo, January 31, 2013), cover price $34.99 | About this edition: Every new device that promises to make our lives easier brings with it the risk of misuse -- whether accidental or intentional.
9781413309263, titled "Smart Policies for Workplace Technologies: Email, Blogs, Cell Phones & More" | 1 pap/cdr edition (Nolo, February 28, 2009), cover price $29.99

cover image for 9780133544015

Hardcover:

9780133544015 | 10th edition (Prentice Hall, September 20, 2014), cover price $254.00
9780132742931 | 9 edition (Prentice Hall, July 13, 2012), cover price $254.00

cover image for 9780749474058
The development of IT governance - which recognizes the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security and cyber risk.  The fifth edition includes chapters on: information security policy and scope; controls against malicious software; e-commerce services and PCI DSS; e-mail, internet use and social media governance; network access controls and hacking attacks; mobile security controls; business continuity management; the ISO27001 audit.The new edition has been fully updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications.  IT Governance also includes new material on key markets - including the UK and the US, Australia and South Africa.

Paperback:

9780749474058 | 6 edition (Kogan Page Ltd, September 28, 2015), cover price $95.00
9780749464851 | 5th edition (Kogan Page Ltd, May 15, 2012), cover price $95.00 | About this edition: The development of IT governance - which recognizes the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security and cyber risk.

cover image for 9780071769051
Product Description: Defend against corporate espionage launched from social networks Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies...read more

Paperback:

9780071769051 | McGraw-Hill Osborne Media, October 10, 2011, cover price $40.00 | About this edition: Defend against corporate espionage launched from social networks Protect your organization from devastating social media attacks with instruction from a team of information security experts.

cover image for 9780470874745
Product Description: The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users...read more

Hardcover:

9780470874745 | John Wiley & Sons Inc, August 9, 2011, cover price $65.00 | About this edition: The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users.

cover image for 9781605668062
By Kay Bryant (editor), John G. Gammack (editor) and Don Kerr (editor)

Hardcover:

9781605668062, titled "Digital Business Security Development: Management Technologies" | Business Science Reference, May 30, 2010, cover price $180.00

Identity management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business. It is the process that enables business initiatives by efficiently managing the user life cycle (including identity/resource provisioning for people (users)), and by integrating it into the required business processes. Identity management encompasses all the data and processes related to the representation of an individual involved in electronic transactions. This IBM® Redbooks® publication provides an approach for designing an identity management solution with IBM Tivoli® Identity Manager Version 5.1. Starting from the high-level, organizational viewpoint, we show how to define user registration and maintenance processes using the self-registration and self-care interfaces as well as the delegated administration capabilities. Using the integrated workflow, we automate the submission/approval processes for identity management requests, and with the automated user provisioning, we take workflow output and automatically implement the administrative requests on the environment with no administrative intervention.This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized identity management and security infrastructure.

Paperback:

9780738433790 | 4th edition (Vervante, November 6, 2009), cover price $81.25
9780738432458 | Vervante, April 9, 2009, cover price $75.00 | About this edition: Identity management is the concept of providing a unifying interface to manage all aspects related to individuals and their interactions with the business.

cover image for 9780471423249
The essential guide to e-business security for managers and IT professionals Securing E-Business Systems provides business managers and executives with an overview of the components of an effective e-business infrastructure, the areas of greatest risk, and best practices safeguards. It outlines a security strategy that allows the identification of new vulnerabilities, assists in rapid safeguard deployment, and provides for continuous safeguard evaluation and modification. The book thoroughly outlines a proactive and evolving security strategy and provides a methodology for ensuring that applications are designed with security in mind. It discusses emerging liabilities issues and includes security best practices, guidelines, and sample policies. This is the bible of e-business security. Timothy Braithwaite (Columbus, MD) is Deputy Director of Information Assurance Programs for Titan Corporation. He has managed data centers, software projects, systems planning, and budgeting organizations, and has extensive experience in project and acquisition management. He is also the author of Y2K Lessons Learned (Wiley: 0-471-37308-7). (view table of contents)

Hardcover:

9780471072980 | John Wiley & Sons Inc, April 17, 2002, cover price $45.00 | About this edition: The essential guide to e-business security for managers and IT professionals Securing E-Business Systems provides business managers and executives with an overview of the components of an effective e-business infrastructure, the areas of greatest risk, and best practices safeguards.

Paperback:

9781119090939 | John Wiley & Sons Inc, April 10, 2002, cover price $45.00 | About this edition: "This is a must-read for the entire CXO community if businesses are to survive in cyberspace.

Miscellaneous:

9780471423249 | John Wiley & Sons Inc, October 15, 2002, cover price $39.95

displaying 1 to 17 | at end