Search the Library Catalogue
| 000 -LEADER | |
|---|---|
| fixed length control field | 02156nam a22001937a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250731b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9780849312397 |
| Paper back/Hardbound | pbk |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Item number | MCB |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Mcbride, Patrick |
| 245 ## - TITLE STATEMENT | |
| Title | Secure Internet Practices: Best Practices For Securing Systems In The Internet And E-business Age |
| Statement of responsibility, etc | Patrick McBride |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New York |
| Name of publisher | Auerbach |
| Year of publication | 2002 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xv, 208 p. |
| Dimensions | 25 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographies and index |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted with a whole new set of security problems. Dealing with the risks of Internet applications and e-commerce requires new ways of thinking about security.<br/>Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age presents an overview of security programs, policies, goals, life cycle development issues, infrastructure, and architecture aimed at enabling you to effectively implement security at your organization. In addition to discussing general issues and solutions, the book provides concrete examples and templates for crafting or revamping your security program in the form of an Enterprise-Wide Security Program Model, and an Information Security Policy Framework.<br/>Although rich in technical expertise, this is not strictly a handbook of Internet technologies, but a guide that is equally useful for developing policies, procedures, and standards. The book touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age shows you how to create a workable security program to protect your organization's Internet risk. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Business Data Processing; Security Measures Computer; Networks Security Measures |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | English Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession Number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Anna Centenary Library | Anna Centenary Library | 3RD FLOOR, A WING | 19.08.2010 | 005.8 MCB | 171622 | 31.07.2025 | English Books |