Welcome to STUDYtactics.com    
  BOOKS eCONTENT SPECIALTY STORES MY STUDYaides MY ACCOUNT  
New & Used Books
 
Product Detail
Product Information   |  Other Product Information

Product Information
Defending the Digital Frontier: Practical Security for Management (Hardback)
Defending the Digital Frontier: Practical Security for Management (Hardback)
Author: Doll, Mark W.
Edition/Copyright: 2ND 05
ISBN: 0-471-68087-7
Publisher: John Wiley & Sons, Inc.
Type: Print On Demand
New Print:  $29.95
Other Product Information
Summary
Table of Contents
 
  Summary

Enhance the digital security knowledge-base within any organization

In today's competitive business environment, information and information technology have become crucial for a company's success. Ensuring the confidentiality of such information-financial, trade secrets, and the like-has become key. Defending the Digital Frontier, Second Edition describes where organizations are vulnerable and identifies protective measures that rely on people and process as much as technology. This book is a practical guide aimed at business leaders and executives, explaining why digital security is not a technical function, but a risk management operation, and illustrates an approach for creating an enterprise-wide security culture based on business-led risk-management principles.

Ernst & Young is a global leader in professional services, providing tax, assurance, and transaction advice to thousands of individuals as well as domestic and global businesses. Ernst & Young provides independent security solutions for some of the world's most information-intensive organizations, including numerous Fortune 500 companies, and the federal government.

 
  Table of Contents

List of Figures and Tables.
Foreword.

Preface.

Acknowledgments.

PART ONE: THE CHALLENGE OF THE FRONTIER.

Chapter 1: Living at the Digital Frontier.

Chapter 3: Organisational Components and Security Objectives.


PART TWO: THE AGENDA FOR ACTION.

Chapter 4: The Security Agenda.

Chapter 5: The Security Life Cycle.


PART THREE: THE APPROACH FOR SAFETY.

Chapter 6: The Security Culture.

Chapter 7: The Risk Frontier.

Chapter 8: Road Map for Success.

Appendix A: Security-Related Laws and Regulations.

Appendix B: Threat Vectors.

Appendix C: Ernst & Young 2004 Digital Security Overview: An Executive Guide and Diagnostic.

Endnotes.

Glossary of Digital Security Terminology.

Index.

 

New & Used Books -  eContent -  Specialty Stores -  My STUDYaides -  My Account

Terms of Service & Privacy PolicyContact UsHelp © 1995-2024 STUDYtactics, All Rights Reserved