Information security : policy, processes, and practices
Author(s)
Bibliographic Information
Information security : policy, processes, and practices
(Advances in management information systems / Vladimir Zwass, series editor, v. 11)
M.E. Sharpe, c2008
Available at 1 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
Description and Table of Contents
Description
Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how organizations and nations organize their information security policies and efforts. The book covers how to strategize and implement security with a special focus on emerging technologies. It highlights the wealth of security technologies, and also indicates that the problem is not a lack of technology but rather its intelligent application.
Table of Contents
Series Editor's Introduction Part I. The Terrain of Information Security 1. Framing the Information Security Process in Modem Society Part II. Security Processes for Organizational Information Systems 2. Information Systems Security Strategy: A Process View 3. IT Governance and Organizational Design for Security Management 4. Information System Risk Assessment and Documentation 5. Strategic Information Security Risk Management 6. Security Policy: From Design to Maintenance 7. Business Continuity Planning and the Protection of Informational Assets Part III. Processes for Securing the Extra-Organizational Setting 8. Information Security Policy in the U.S. National Context 9. The International Landscape of Cyber Security Part IV. Forces and Research Leading to Future Information Security Processes 10. Emerging Ubiquitous Computing Technologies and Security Management Strategy 11. Promising Future Research in InfoSec
by "Nielsen BookData"