Description

"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation's enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy."
—John R. Thomas, Colonel, U.S. Army, Retired Former Commander of the DoD, Global Operations and Security Center

Today's e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts tomeet a company's changing security needs.

Topics include:

  • Security weaknesses
  • Safeguarding technologies
  • Countermeasure best practices
  • Establishing an adaptable e-business security management program
  • Essential elements of a corporate security management program
  • Functions, structure, staffing, and contracting considerations in security management
  • Implementing intrusion detection technology
  • Designing tomorrow's e-business application for secured operations
  • Contemporary rationales for justifying increased spending on security programs
  • Emerging liability issues for e-businesses

Securing E-Business Systems: A Guide for Managers and Executives

Product form

£31.49

Includes FREE delivery
RRP: £34.99 You save £3.50 (10%)
Usually despatched within 5 days
Paperback / softback by Timothy Braithwaite

3 in stock

Short Description:

"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the... Read more

    Publisher: John Wiley & Sons Inc
    Publication Date: 14/08/2015
    ISBN13: 9781119090939, 978-1119090939
    ISBN10: 1119090938

    Number of Pages: 290

    Non Fiction , Business, Finance & Law

    Description

    "This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation's enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy."
    —John R. Thomas, Colonel, U.S. Army, Retired Former Commander of the DoD, Global Operations and Security Center

    Today's e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts tomeet a company's changing security needs.

    Topics include:

    • Security weaknesses
    • Safeguarding technologies
    • Countermeasure best practices
    • Establishing an adaptable e-business security management program
    • Essential elements of a corporate security management program
    • Functions, structure, staffing, and contracting considerations in security management
    • Implementing intrusion detection technology
    • Designing tomorrow's e-business application for secured operations
    • Contemporary rationales for justifying increased spending on security programs
    • Emerging liability issues for e-businesses

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2025 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account