Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Achieving and sustaining secured bus...
~
Ajmani, Neelesh.
Linked to FindBook
Google Book
Amazon
博客來
Achieving and sustaining secured business operations = an executive's guide to planning and management /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Achieving and sustaining secured business operations/ by Neelesh Ajmani, Dinesh Kumar.
Reminder of title:
an executive's guide to planning and management /
Author:
Ajmani, Neelesh.
other author:
Kumar, Dinesh.
Published:
Berkeley, CA :Apress : : 2017.,
Description:
xviii, 168 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.
Contained By:
Springer eBooks
Subject:
Small business - Management. -
Online resource:
http://dx.doi.org/10.1007/978-1-4842-3099-2
ISBN:
9781484230992
Achieving and sustaining secured business operations = an executive's guide to planning and management /
Ajmani, Neelesh.
Achieving and sustaining secured business operations
an executive's guide to planning and management /[electronic resource] :by Neelesh Ajmani, Dinesh Kumar. - Berkeley, CA :Apress :2017. - xviii, 168 p. :ill., digital ;24 cm.
Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What You'll Learn: Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models.
ISBN: 9781484230992
Standard No.: 10.1007/978-1-4842-3099-2doiSubjects--Topical Terms:
645996
Small business
--Management.
LC Class. No.: HD62.7
Dewey Class. No.: 658.022
Achieving and sustaining secured business operations = an executive's guide to planning and management /
LDR
:02939nmm a2200325 a 4500
001
2112886
003
DE-He213
005
20171207163133.0
006
m d
007
cr nn 008maaau
008
180719s2017 cau s 0 eng d
020
$a
9781484230992
$q
(electronic bk.)
020
$a
9781484230985
$q
(paper)
024
7
$a
10.1007/978-1-4842-3099-2
$2
doi
035
$a
978-1-4842-3099-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HD62.7
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
658.022
$2
23
090
$a
HD62.7
$b
.A312 2017
100
1
$a
Ajmani, Neelesh.
$3
3270970
245
1 0
$a
Achieving and sustaining secured business operations
$h
[electronic resource] :
$b
an executive's guide to planning and management /
$c
by Neelesh Ajmani, Dinesh Kumar.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2017.
300
$a
xviii, 168 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.
520
$a
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What You'll Learn: Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models.
650
0
$a
Small business
$x
Management.
$3
645996
650
0
$a
Industrial management.
$3
529072
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Kumar, Dinesh.
$3
3270971
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-3099-2
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9325159
電子資源
11.線上閱覽_V
電子書
EB HD62.7
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login