Wonder Club world wonders pyramid logo
×

Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age Book

Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age, Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit, Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age has a rating of 4 stars
   2 Ratings
X
Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age, Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit, Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age
4 out of 5 stars based on 2 reviews
5
50 %
4
0 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age
  • Written by author Patrick McBride
  • Published by Taylor & Francis, Inc., September 2001
  • Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit
  • Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Acknowledgments
Copyright Notice
Table of Contents
Figures and Illustrations
Preface
Introduction1
Ch. 1The Information Security Program21
The Present Information Systems Environment23
A Risk Construct24
Information Risk Management26
Enterprise-Wide Information Security Program Model: Functional Overview27
The Enterprise-Wide Information Security Program Elements: Framework, Organization, Technology, and Process31
Creating a Successful Security Program35
Building the Security Program39
Ch. 2Developing an Information Security Policy49
The Impact of the Internet52
Characteristics of Good Information Security Policy54
METASeS Information Security Policy Framework56
Policy Interpretation66
Information Security Policy Life Cycle68
Assessing Policy Needs69
Developing Information Security Policy72
Implementing and Deploying Policy78
Maintaining Information Security Policy82
Ch. 3Web and e-Commerce Security83
Chapter Components84
Information Security Goals85
Web and e-Commerce Security Architecture90
The Process of Formulating Architecture92
Types of Architecture98
System Development Life Cycle (SDLC) Methodology107
The Underlying Infrastructure Components120
App. ASample Excerpt from an Information Security Program Gap Analysis147
App. BExcerpts from Technology Standards and Configuration Guides Publications153
App. C: Resources for Information Security and Policy169
App. D: Examples of Processes and Procedures175
App. ETrends in Security Spending183
Glossary195
Index201
Tell Us What You Think205
About METASeS207
About DefenseONE-CommandCenter.com209


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age, Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit, Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age

X
WonderClub Home

This item is in your Collection

Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age, Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit, Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age

Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age

X
WonderClub Home

This Item is in Your Inventory

Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age, Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted wit, Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age

Secure Internet Practices: Best Practices for Securing Systems in the Internet and E-Business Age

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: