책 이미지
eBook 미리보기
책 정보
· 제목 : Security Transformation (Hardcover) (Digital Defense Strategies to Protect Your Company's Reputation and Market Share)
· 분류 : 외국도서 > 경제경영 > 정보관리
· ISBN : 9780071379663
· 쪽수 : 211쪽
· 출판일 : 2001-05-01
· 분류 : 외국도서 > 경제경영 > 정보관리
· ISBN : 9780071379663
· 쪽수 : 211쪽
· 출판일 : 2001-05-01
목차
Introduction.
Part I: Are You Scared Yet?
Chapter 1: The World Under Siege.
Chapter 2: Just When We Thought It Was Safe...
Part II: The Benefits.
Chapter 3: A Business Enabler.
Chapter 4: It's All About Trust.
Part III: The Approach.
Chapter 5: A Multifaceted Process.
Chapter 6: Prevention, Detection, and Response.
Part IV: The Underpinnings.
Chapter 7: Assessing the Security Risk.
Chapter 8: Your Enterprise Security Architecture.
Part V: Peering Ahead.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Chapter 1: The World Under Siege.
Chapter 2: Just When We Thought It Was Safe...
Part II: The Benefits.
Chapter 3: A Business Enabler.
Chapter 4: It's All About Trust.
Part III: The Approach.
Chapter 5: A Multifaceted Process.
Chapter 6: Prevention, Detection, and Response.
Part IV: The Underpinnings.
Chapter 7: Assessing the Security Risk.
Chapter 8: Your Enterprise Security Architecture.
Part V: Peering Ahead.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Part II: The Benefits.
Chapter 3: A Business Enabler.
Chapter 4: It's All About Trust.
Part III: The Approach.
Chapter 5: A Multifaceted Process.
Chapter 6: Prevention, Detection, and Response.
Part IV: The Underpinnings.
Chapter 7: Assessing the Security Risk.
Chapter 8: Your Enterprise Security Architecture.
Part V: Peering Ahead.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Chapter 4: It's All About Trust.
Part III: The Approach.
Chapter 5: A Multifaceted Process.
Chapter 6: Prevention, Detection, and Response.
Part IV: The Underpinnings.
Chapter 7: Assessing the Security Risk.
Chapter 8: Your Enterprise Security Architecture.
Part V: Peering Ahead.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Chapter 5: A Multifaceted Process.
Chapter 6: Prevention, Detection, and Response.
Part IV: The Underpinnings.
Chapter 7: Assessing the Security Risk.
Chapter 8: Your Enterprise Security Architecture.
Part V: Peering Ahead.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Part IV: The Underpinnings.
Chapter 7: Assessing the Security Risk.
Chapter 8: Your Enterprise Security Architecture.
Part V: Peering Ahead.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Chapter 8: Your Enterprise Security Architecture.
Part V: Peering Ahead.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Chapter 9: Taking Back Control.
Chapter 10: Privacy and Security.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Bibliography.
Glossary.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
Appendix A: New Strategies of Success in E-Business: Managing Risks to Protect Brand, Retain Customers, and Enhance Market Capitalization.
Appendix B: E-Commerce and Cyber Crime: New Strategies for Managing the Risks of Exploitation.
추천도서
분야의 베스트셀러 >














