Guarding Your Business: A Management Approach to Security
Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2004
|
Ausgabe: | 1st ed. 2004 |
Schlagworte: | |
Online-Zugang: | BTU01 URL des Erstveröffentlichers |
Zusammenfassung: | Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed? |
Beschreibung: | 1 Online-Ressource (XIV, 252 p. 16 illus) |
ISBN: | 9780306486388 |
DOI: | 10.1007/b105306 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046874036 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200828s2004 |||| o||u| ||||||eng d | ||
020 | |a 9780306486388 |9 978-0-306-48638-8 | ||
024 | 7 | |a 10.1007/b105306 |2 doi | |
035 | |a (ZDB-2-SBE)978-0-306-48638-8 | ||
035 | |a (OCoLC)903188799 | ||
035 | |a (DE-599)BVBBV046874036 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
082 | 0 | |a 658.4092 |2 23 | |
245 | 1 | 0 | |a Guarding Your Business |b A Management Approach to Security |c edited by Manu Malek, Sumit Ghosh, Edward A. Stohr |
250 | |a 1st ed. 2004 | ||
264 | 1 | |a New York, NY |b Springer US |c 2004 | |
300 | |a 1 Online-Ressource (XIV, 252 p. 16 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed? | ||
650 | 4 | |a Business Strategy/Leadership | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Electrical Engineering | |
650 | 4 | |a Social Sciences, general | |
650 | 4 | |a Systems Theory, Control | |
650 | 4 | |a Anthropology | |
650 | 4 | |a Leadership | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Social sciences | |
650 | 4 | |a System theory | |
650 | 4 | |a Anthropology | |
700 | 1 | |a Malek, Manu |4 edt | |
700 | 1 | |a Ghosh, Sumit |4 edt | |
700 | 1 | |a Stohr, Edward A. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475782127 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475782110 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780306484940 |
856 | 4 | 0 | |u https://doi.org/10.1007/b105306 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SBE |a ZDB-2-BAE | ||
940 | 1 | |q ZDB-2-SBE_Archiv | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032284168 | ||
966 | e | |u https://doi.org/10.1007/b105306 |l BTU01 |p ZDB-2-SBE |q ZDB-2-SBE_Archiv |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181724918185984 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Malek, Manu Ghosh, Sumit Stohr, Edward A. |
author2_role | edt edt edt |
author2_variant | m m mm s g sg e a s ea eas |
author_facet | Malek, Manu Ghosh, Sumit Stohr, Edward A. |
building | Verbundindex |
bvnumber | BV046874036 |
collection | ZDB-2-SBE ZDB-2-BAE |
ctrlnum | (ZDB-2-SBE)978-0-306-48638-8 (OCoLC)903188799 (DE-599)BVBBV046874036 |
dewey-full | 658.4092 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4092 |
dewey-search | 658.4092 |
dewey-sort | 3658.4092 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
doi_str_mv | 10.1007/b105306 |
edition | 1st ed. 2004 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02903nmm a2200577zc 4500</leader><controlfield tag="001">BV046874036</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200828s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780306486388</subfield><subfield code="9">978-0-306-48638-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b105306</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SBE)978-0-306-48638-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)903188799</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046874036</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4092</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Guarding Your Business</subfield><subfield code="b">A Management Approach to Security</subfield><subfield code="c">edited by Manu Malek, Sumit Ghosh, Edward A. Stohr</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2004</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 252 p. 16 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business Strategy/Leadership</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Sciences, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems Theory, Control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Anthropology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Leadership</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Anthropology</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malek, Manu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghosh, Sumit</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stohr, Edward A.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475782127</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475782110</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780306484940</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b105306</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SBE</subfield><subfield code="a">ZDB-2-BAE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SBE_Archiv</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032284168</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b105306</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SBE</subfield><subfield code="q">ZDB-2-SBE_Archiv</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046874036 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:15:40Z |
indexdate | 2024-07-10T08:56:13Z |
institution | BVB |
isbn | 9780306486388 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032284168 |
oclc_num | 903188799 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | 1 Online-Ressource (XIV, 252 p. 16 illus) |
psigel | ZDB-2-SBE ZDB-2-BAE ZDB-2-SBE_Archiv ZDB-2-SBE ZDB-2-SBE_Archiv |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer US |
record_format | marc |
spelling | Guarding Your Business A Management Approach to Security edited by Manu Malek, Sumit Ghosh, Edward A. Stohr 1st ed. 2004 New York, NY Springer US 2004 1 Online-Ressource (XIV, 252 p. 16 illus) txt rdacontent c rdamedia cr rdacarrier Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed? Business Strategy/Leadership Management of Computing and Information Systems Electrical Engineering Social Sciences, general Systems Theory, Control Anthropology Leadership Management information systems Computer science Electrical engineering Social sciences System theory Malek, Manu edt Ghosh, Sumit edt Stohr, Edward A. edt Erscheint auch als Druck-Ausgabe 9781475782127 Erscheint auch als Druck-Ausgabe 9781475782110 Erscheint auch als Druck-Ausgabe 9780306484940 https://doi.org/10.1007/b105306 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Guarding Your Business A Management Approach to Security Business Strategy/Leadership Management of Computing and Information Systems Electrical Engineering Social Sciences, general Systems Theory, Control Anthropology Leadership Management information systems Computer science Electrical engineering Social sciences System theory |
title | Guarding Your Business A Management Approach to Security |
title_auth | Guarding Your Business A Management Approach to Security |
title_exact_search | Guarding Your Business A Management Approach to Security |
title_exact_search_txtP | Guarding Your Business A Management Approach to Security |
title_full | Guarding Your Business A Management Approach to Security edited by Manu Malek, Sumit Ghosh, Edward A. Stohr |
title_fullStr | Guarding Your Business A Management Approach to Security edited by Manu Malek, Sumit Ghosh, Edward A. Stohr |
title_full_unstemmed | Guarding Your Business A Management Approach to Security edited by Manu Malek, Sumit Ghosh, Edward A. Stohr |
title_short | Guarding Your Business |
title_sort | guarding your business a management approach to security |
title_sub | A Management Approach to Security |
topic | Business Strategy/Leadership Management of Computing and Information Systems Electrical Engineering Social Sciences, general Systems Theory, Control Anthropology Leadership Management information systems Computer science Electrical engineering Social sciences System theory |
topic_facet | Business Strategy/Leadership Management of Computing and Information Systems Electrical Engineering Social Sciences, general Systems Theory, Control Anthropology Leadership Management information systems Computer science Electrical engineering Social sciences System theory |
url | https://doi.org/10.1007/b105306 |
work_keys_str_mv | AT malekmanu guardingyourbusinessamanagementapproachtosecurity AT ghoshsumit guardingyourbusinessamanagementapproachtosecurity AT stohredwarda guardingyourbusinessamanagementapproachtosecurity |