Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Socially Responsible IT Management shows IT professionals how to overcome the social crisis that has resulted from the wide-spread use of information technology. By responsibly managing security threats, protecting individual privacy, reducing hazardous waste, and minimizing other negative effects on IT staff and computer users, as well as ordinary citizens around the world, IT professionals can benefit the society at large and reap rewards for their own organizations as well.Scandals at Enron, Andersen, Sotheby's and Christie's, Merrill Lynch, and Tyco are fueling a crisis of confiden
Information technology --- Social responsibility of business. --- Business enterprises --- Business --- Management. --- Computer networks. --- Data processing. --- Electronic data processing --- Corporate accountability --- Corporate responsibility --- Corporate social responsibility --- Corporations --- CSR (Corporate social responsibility) --- Industries --- Social responsibility, Corporate --- Social responsibility of industry --- Social responsibility --- Business ethics --- Issues management --- Social aspects
Choose an application
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an
Choose an application
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organi
Computer security. --- Internet --- Computer networks --- Cyberterrorism. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer crimes --- Terrorism --- Computer security --- Electronic terrorism (Cyberterrorism)
Choose an application
Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information
Computer security. --- Computer viruses. --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 4 of 4 |
Sort by
|