+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Securing E–Business Systems: A Guide for Managers and Executives

  • ID: 3387173
  • Book
  • 224 Pages
  • John Wiley and Sons Ltd
1 of 2

"This is a must–read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation′s enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy."
John R. Thomas, Colonel, U.S. Army, Retired Former Commander of the DoD, Global Operations and Security Center

Today′s e–business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E–Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts tomeet a company′s changing security needs.

Topics include:

  • Security weaknesses
  • Safeguarding technologies
  • Countermeasure best practices
  • Establishing an adaptable e–business security management program
  • Essential elements of a corporate security management program
  • Functions, structure, staffing, and contracting considerations in security management
  • Implementing intrusion detection technology
  • Designing tomorrow′s e–business application for secured operations
  • Contemporary rationales for justifying increased spending on security programs
  • Emerging liability issues for e–businesses
Note: Product cover images may vary from those shown
2 of 2


3 of 2
Timothy Braithwaite
Note: Product cover images may vary from those shown