Sold Out
Book Categories |
List of Figures and Tables | ||
Foreword | ||
Preface | ||
Acknowledgments | ||
Pt. 1 | The Challenge of the Frontier | 1 |
Ch. 1 | The Security Frontier | 5 |
Ch. 2 | Security Characteristics | 27 |
Ch. 3 | Organizational Components and Security Objectives | 47 |
Pt. 2 | The Agenda for Action | 57 |
Ch. 4 | The Security Agenda | 61 |
Ch. 5 | The Three Rs of Digital Security | 77 |
Pt. 3 | The Approach for Safety | 119 |
Ch. 6 | The Security Culture | 123 |
Ch. 7 | The Risk Frontier | 131 |
Ch. 8 | Road Map for Success | 147 |
App. A | Security-Related Laws and Regulations | 159 |
App. B | Threat Vectors | 167 |
App. C | Ernst & Young 2002 Digital Security Overview: An Executive Guide and Diagnostic | 171 |
Endnotes | 213 | |
Glossary of Digital Security Terminology | 215 | |
Index | 227 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionDefending the digital frontier
X
This Item is in Your InventoryDefending the digital frontier
X
You must be logged in to review the productsX
X
X
Add Defending the digital frontier, Like it or not, every company finds itself a pioneer in the digital frontier. And like all frontiers, this one involves exploration, potentially high returns . . . and high risks. Consider this: according to Computer Economics, the worldwide economic i, Defending the digital frontier to the inventory that you are selling on WonderClubX
X
Add Defending the digital frontier, Like it or not, every company finds itself a pioneer in the digital frontier. And like all frontiers, this one involves exploration, potentially high returns . . . and high risks. Consider this: according to Computer Economics, the worldwide economic i, Defending the digital frontier to your collection on WonderClub |