Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Information Assurance
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Information Assurance

Information Assurance

Surviving in the Information Environment

Andrew Blyth, Gerald L. Kovacich

336 pages, parution le 18/10/2001

Résumé

Environment examines why organisations need to take information assurance seriously - and covers the business, legal, and technical knowledge needed to do so. It bridges the gap between information security as a technical concept and information security as a business concept, and helps IS managers to manage security effectively so as to facilitate business processes and develop competitive advantage.
Key topics include:
- The role of the corporate security officer;
- Corporate cybercrime;
- Electronic commerce and the global marketplace;
- Cryptography;
- International standards, policies and security acts.
Written primarily as a reference for IS managers who need help in dealing with day-to-day security issues, this book will also provide invaluable reading for project managers, IT strategists, business managers and postgraduate students on conversion, Advanced Information Systems and MBA Management courses.

Contents

I. An Introduction to Information Assurance:
  • 1. What is Information Assurance?.
  • 2. The World of Information.
  • 3. The Theory of Risks.
  • 4. The Information World of Crime .
  • 5. IA Trust and Supply Chains.
  • 6. Basic IA Concepts and Models.
II. IA in the World of Corporations:
  • 7. The Corporate Security Officer.
  • 8. Corporate Security Fuctions.
  • 9. IA in the Interest of National Security.
  • 10. The Corporate IA Officer.
  • 11. IA Organisational Functions.
III. Technical Aspects of IA:
  • 12. IA and Software.
  • 13. Applying Cryptography to IA.
  • 14. Information Technology Security.
IV. The Future:
  • 15. The Future and Final Thoughts.
Appendix:
  • References and Recommended Readings.
  • Appendix 2: UK Computer Misuse Act of 1990.
  • Appendix 3: "Computer Misuse Act 1990 - Loopholes and Anomalies".
  • Appendix 4: US Computer Security Act of 1987.
  • Appendix 5: BS7799.
  • Appendix 6: MIS Training Institute "Swiss Army Knife"
  • Bibliography.
  • Index.

Caractéristiques techniques

  PAPIER
Éditeur(s) Springer
Auteur(s) Andrew Blyth, Gerald L. Kovacich
Parution 18/10/2001
Nb. de pages 336
Format 15,5 x 23,5
Couverture Broché
Poids 550g
Intérieur Noir et Blanc
EAN13 9781852333263

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription