Cargando…

Mapping security : the corporate security sourcebook for today's global economy /

Praise for Tom Patterson's Mapping Security "Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!"--Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP)...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Patterson, Tom
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Addison Wesley Professional, 2004.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1019733151
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 180116s2004 inu o 000 0 eng
040 |a UIU  |b eng  |e pn  |c UIU  |d AU@  |d CEF  |d C6I  |d CNCEN  |d OCLCO  |d OCLCF  |d OCLCO  |d HS0  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1180297837 
020 |z 0321304527 
029 1 |a AU@  |b 000073551257 
035 |a (OCoLC)1019733151  |z (OCoLC)1180297837 
050 4 |a HF5548.37.P38 2005 
049 |a UAMI 
100 1 |a Patterson, Tom. 
245 1 0 |a Mapping security :  |b the corporate security sourcebook for today's global economy /  |c Tom Patterson, Scott Gleeson Blue ; [edited by] Jessica Soldstein, Christy Hackerd, Gina Kanouse. 
260 |a Indianapolis, IN :  |b Addison Wesley Professional,  |c 2004. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Praise for Tom Patterson's Mapping Security "Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!"--Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP) "The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson has more than a decade of first-hand experience in defending against such risks and it shows. He uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to businesspeople around the globe." -Chris Anderson, Editor in Chief, Wired Magazine Whether consumers or global giants, we all need to be spending a greater share of our budgets on security. The threats are greater than ever and increasing daily, and yet there is a challenge as to how to justify the expenditure. Mapping Security offers business-oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency.-John R Patrick, president of Attitude LLC and former vice president of Internet Technology at IBM Corporation As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how.-Dr. Craig Fields, former director of Advanced Research Projects Agency (ARPA) for the U.S. Government The Definitive Guide to Effective Security in Complex Global Markets Companies are global today and have complex security supply chains, out-sourced operations, and customer relationships that span the world. Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business. Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritativ ... 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Patterson, Tom.  |t Mapping security.  |d Indianapolis, IN : Addison Wesley Professional, 2004  |w (DLC) 2004113324 
856 4 0 |u https://learning.oreilly.com/library/view/~/0321304527/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP