The Resource Computers, business, and security : the new role for security, James A. Schweitzer

Computers, business, and security : the new role for security, James A. Schweitzer

Label
Computers, business, and security : the new role for security
Title
Computers, business, and security
Title remainder
the new role for security
Statement of responsibility
James A. Schweitzer
Creator
Author
Subject
Language
eng
Summary
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat
Cataloging source
E7B
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
.S355 1987eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Label
Computers, business, and security : the new role for security, James A. Schweitzer
Publication
Copyright
Bibliography note
Includes bibliographical references and index
http://library.link/vocab/branchCode
  • net
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Front Cover; Computers, Business, and Security: The New Role for Security; Copyright Page; Table of Contents ; Preface; PART I: THE COMPUTER AND SECURITY IN THE INFORMATION AGE; Chapter 1. Managing Security in the Information Age; The Five Critical Tasks; Implications for Business Security; Chapter 2. Computers and Security; Risks in Using Computers; Applying Information Security Technology; Defining Preferred Protection Methods; Levels of Protection; Protecting Mental Information; Protecting Written Information; Protecting Electronic Information; The Technology of Attack
  • Causes of Security ViolationsProtection Measures; Summary; PART II: THE FIVE CRITICAL TASKS; Chapter 3. Critical Task 1: Integrating Computing into the Security Function; Technical Competence on the Security Staff; Selecting the Right Person; Job Assignments; Electronic Security Tasks; Electronic Information Security Standards; Chapter 4. Critical Task 2: Integrating Technology into the Security Function; Ultrasonics; Sensing Technologies; Video; Control Systems; Biometrics and Smart Cards; Electronic Surveillance and Countermeasures; Radio Wave Interception; System Integration
  • Chapter 5. Critical Task 3: Adapting the Business Security Management Process to Information Age RequirementsInformation Application; Reduction of Overhead, Improvement of Quality, Return on Assets; Making Security Investment Decisions; Security Strategy as a Basis for Choice; Chapter 6. Critical Task 4: Protecting the Business Information Resource; Background; A Beginning; Information Resource Management; Attributes of Quality Information; Implementing Information Resource Management; Security Roles in Information Resource Management; Classification of Information; Setting Policy
  • Program Assumptions and RequirementsThe Security Manager as a Business Manager; The Right Security Product; Making Competent Technology Decisions; Demonstrating a Contribution; Security Organization for the Information Age; Principles of Security Organization; Organizational Alternatives; Planning; Setting the Security Organizational Structure; Rules of Thumb for Security Organization; Implementing the Security Program; Getting the Security Message to the People; The Security Coordinator Network; The Security Coordinator's Tasks; Security Coordinator Selection, Training, and Motivation
  • Regulations Covering ClassificationGeneral Guidelines; Classification References; Chapter 7. Critical Task 5: Establishing Security as an Essential Management Function; The Security Manager as Business Executive; Establishing Leadership among Peers in the Company; The Security Manager and Senior Executive Management; Executive Management Characteristics; Considerations: The Security Manager and Executive Management; Risk Management Concepts: A Framework; PART III: SECURING TODAY'S BUSINESS; Chapter 8. Putting It Together: A Security Program for the Information Age
Control code
ocn903963959
Dimensions
unknown
Extent
1 online resource (167 pages)
Form of item
online
Isbn
9781483144894
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/recordID
.b37027402
Specific material designation
remote
System control number
  • (OCoLC)903963959
  • pebc1483144895

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...