Protecting Business Information: A Manager's Guide / Edition 1

Protecting Business Information: A Manager's Guide / Edition 1

by James A Schweitzer, Schweitzer
     
 

ISBN-10: 0750696583

ISBN-13: 9780750696586

Pub. Date: 11/23/1995

Publisher: Elsevier Science

'Protecting Business Information: A Manager's guide' is an introduction to the information resource, its sensitivity, value and susceptibility to risk. This book provides an outline for a business information security program and provides clear answers to the why and how of information protection.

Protecting Business Information' provides detailed processes

…  See more details below

Overview

'Protecting Business Information: A Manager's guide' is an introduction to the information resource, its sensitivity, value and susceptibility to risk. This book provides an outline for a business information security program and provides clear answers to the why and how of information protection.

Protecting Business Information' provides detailed processes for analysis, leading to a complete and adequate information classification. It includes a thorough description of the methods for information classification.

A valuable guide based on the author's fifteen year's experience in building and implementing information security programs for large, worldwide businesses.
Provides a basis for the reasoning behind information protection processes.
Suggests practical means for aligning an information security investment with business needs.

Product Details

ISBN-13:
9780750696586
Publisher:
Elsevier Science
Publication date:
11/23/1995
Pages:
199
Product dimensions:
0.56(w) x 6.14(h) x 9.21(d)

Table of Contents

Part I - THE CASE FOR INFORMATION SECURITY: 1 Some Background on Information Protection; 2 The Management Issue: Why bother with Information Security? 3 Information Threats and Vunerabilities; Part II - PROTECTION OF INFORMATION:CONCEPTS AND METHODS: 4 Information Concepts; 5 Establishing Proprietary Rights to Information; 6 Information Protection Methods; 7 Securing the Information Environments; 8 Computer Security; 9 Communications Security; Part III - INFORMATION SECURITY MANAGEMENT: 10 Information Security in the Business Enterprise; 11 Relating Information Security Investment to Business Needs; 12 Information Security Directives; 13 Setting Up the Information Security Program; 14 Administration and Maintenance of Information Security; Part IV - A COMPENDIUM OF TERMS WITH ISSUES, CONCERNS, AND SOLUTIONS.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >