Skip to content
Scan a barcode
Scan
Paperback Securing E-Business Systems: A Guide for Managers and Executives Book

ISBN: 1119090938

ISBN13: 9781119090939

Securing E-Business Systems: A Guide for Managers and Executives

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: New

$32.34
Save $12.66!
List Price $45.00
Ships within 2-3 days
Save to List

Book Overview

"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation's enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy." --John R. Thomas, Colonel, U.S. Army, Retired Former Commander of the DoD, Global Operations and Security Center Today's e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts tomeet a company's changing security needs. Topics include: Security weaknesses Safeguarding technologies Countermeasure best practices Establishing an adaptable e-business security management program Essential elements of a corporate security management program Functions, structure, staffing, and contracting considerations in security management Implementing intrusion detection technology Designing tomorrow's e-business application for secured operations Contemporary rationales for justifying increased spending on security programs Emerging liability issues for e-businesses

Customer Reviews

0 rating
Copyright © 2026 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured