Amazon cover image
Image from Amazon.com

IT security [electronic resource] : advice from experts / Lawrence M. Oliva.

By: Contributor(s): Series: IT solutions seriesPublication details: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2004.Description: electronic texts (ix, 171 p. : ill.) : digital filesISBN:
  • 1591402484 (ebook)
  • 9781591402480 (ebook)
Other title:
  • Information technology security [Cover title]
Subject(s): Genre/Form: Additional physical formats: No titleDDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 O64 2004e
Online resources: Available additional physical forms:
  • Also available in print.
Contents:
1. Executive overview/ Lawrence M. Oliva -- Section I. Governance issues -- 2. Aligning assurance requirements, countermeasures, and business / Craig E. Kaucher -- 3. Protecting customer provided information / Charles Rex IV -- 4. Global IT risk management strategies / Chrisan Herrod -- Section II. Architecture issues -- 5. Architecture issues / Lawrence M. Oliva -- Section III. Technology issues -- 6. Wireless information security / Clifton Poole -- 7. Reference materials -- About the authors -- Index.
Abstract: Increasing every day in frequency and sophistication, planned cyber attacks are impacting systems, data and user access at virtually every business and government organization. Whether accidentally triggered by users opening their daily e-mail, or planned denial of services attack triggering a thousand zombie systems, IT management and corporate executives must be ready to respond, minimize and defeat threats to revenue generating and citizen facing operations. In many cases, the decision to protect information assets may materially impact agency or corporate budgets, previously planned investment and projected shareholder returns.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references (p. 152-165) and index.

1. Executive overview/ Lawrence M. Oliva -- Section I. Governance issues -- 2. Aligning assurance requirements, countermeasures, and business / Craig E. Kaucher -- 3. Protecting customer provided information / Charles Rex IV -- 4. Global IT risk management strategies / Chrisan Herrod -- Section II. Architecture issues -- 5. Architecture issues / Lawrence M. Oliva -- Section III. Technology issues -- 6. Wireless information security / Clifton Poole -- 7. Reference materials -- About the authors -- Index.

Restricted to subscribers or individual electronic text purchasers.

Increasing every day in frequency and sophistication, planned cyber attacks are impacting systems, data and user access at virtually every business and government organization. Whether accidentally triggered by users opening their daily e-mail, or planned denial of services attack triggering a thousand zombie systems, IT management and corporate executives must be ready to respond, minimize and defeat threats to revenue generating and citizen facing operations. In many cases, the decision to protect information assets may materially impact agency or corporate budgets, previously planned investment and projected shareholder returns.

Also available in print.

Mode of access: World Wide Web.

Title from PDF t.p. (viewed on June 26, 2010).

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu