語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information governance and security ...
~
Iannarelli, John G.,
FindBook
Google Book
Amazon
博客來
Information governance and security = protecting and managing your company's proprietary information /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information governance and security/ John Iannarelli, Michael O'Shaughnessy.
其他題名:
protecting and managing your company's proprietary information /
作者:
Iannarelli, John G.,
其他作者:
O'Shaughnessy, Michael,
出版者:
Oxford, England ;Elsevier, : 2015.,
面頁冊數:
1 online resource (xvi, 191 p.) :ill., graphs.
內容註:
Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
內容註:
Chapter 4 -- The Changing Corporate LandscapeToday's Cyber Environment; The Federal Government; The Private Sector; Why Should Corporate America Care?; References; Chapter 5 -- How Information Governance Fits in the New World; Issues in the New World; References; Chapter 6 -- The Human Element; Cyber; Physical Acts; References; Chapter 7 -- The Technical Side; The Benefits; Concerns Brought About by Technology; References; Chapter 8 -- Balancing Information Governance and Your Company's Mission; Policies; Factors to Consider; References
內容註:
Chapter 9 -- The Case for Information Governance from within Your OrganizationNegative Perceptions of Information Governance; Implementation; References; Chapter 10 -- What to do First; The Basics; How to Determine Information Governance Needs for Your Company; How to Create Information Governance Policies; Methods of Security to Support Information Governance; How to Implement Information Governance Policies; References; Chapter 11 -- What to do Forever; Continuing Efforts; Evaluate Effectiveness of Information Governance Policies
內容註:
Encouraging Accountability and Ownership of Information GovernanceTraining and Education of Employees About Information Governance; References; Chapter 12 -- Charting the Best Future Course for Your Organization; Information Governance Impacts All Facets of an Organization; Closing Thoughts; References; Appendix A; Information Security Personnel Check List; Appendix B; Appendix C; Works Cited; Index
標題:
Knowledge management. -
電子資源:
https://www.sciencedirect.com/science/book/9780128002476
ISBN:
9780128004067 (electronic bk.)
Information governance and security = protecting and managing your company's proprietary information /
Iannarelli, John G.,
Information governance and security
protecting and managing your company's proprietary information /[electronic resource] :John Iannarelli, Michael O'Shaughnessy. - Oxford, England ;Elsevier,2015. - 1 online resource (xvi, 191 p.) :ill., graphs.
Includes bibliographical references at the end of each chapters and index.
Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --
ISBN: 9780128004067 (electronic bk.)Subjects--Topical Terms:
563681
Knowledge management.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HD30.2 / .I2336 2015eb
Dewey Class. No.: 658.4/038
Information governance and security = protecting and managing your company's proprietary information /
LDR
:03979cmm a2200313 a 4500
001
2223582
006
o d
007
cnu|unuuu||
008
210114s2015 enka ob 001 0 eng d
020
$a
9780128004067 (electronic bk.)
020
$a
0128004061 (electronic bk.)
020
$a
9780128002476
020
$a
0128002476
035
$a
(OCoLC)891397260
035
$a
EL2020312
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
UIU
$d
OCLCF
$d
CUI
$d
S4S
$d
STF
$d
B24X7
$d
COO
$d
OCLCQ
$d
LIV
$d
D6H
$d
LQU
$d
UHL
$d
VLB
$d
BRF
041
0
$a
eng
050
4
$a
HD30.2
$b
.I2336 2015eb
082
0 4
$a
658.4/038
$2
23
100
1
$a
Iannarelli, John G.,
$e
author.
$3
3463201
245
1 0
$a
Information governance and security
$h
[electronic resource] :
$b
protecting and managing your company's proprietary information /
$c
John Iannarelli, Michael O'Shaughnessy.
260
$a
Oxford, England ;
$a
Waltham, Massachusetts :
$b
Elsevier,
$c
2015.
300
$a
1 online resource (xvi, 191 p.) :
$b
ill., graphs.
504
$a
Includes bibliographical references at the end of each chapters and index.
505
0
$a
Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
505
8
$a
Chapter 4 -- The Changing Corporate LandscapeToday's Cyber Environment; The Federal Government; The Private Sector; Why Should Corporate America Care?; References; Chapter 5 -- How Information Governance Fits in the New World; Issues in the New World; References; Chapter 6 -- The Human Element; Cyber; Physical Acts; References; Chapter 7 -- The Technical Side; The Benefits; Concerns Brought About by Technology; References; Chapter 8 -- Balancing Information Governance and Your Company's Mission; Policies; Factors to Consider; References
505
8
$a
Chapter 9 -- The Case for Information Governance from within Your OrganizationNegative Perceptions of Information Governance; Implementation; References; Chapter 10 -- What to do First; The Basics; How to Determine Information Governance Needs for Your Company; How to Create Information Governance Policies; Methods of Security to Support Information Governance; How to Implement Information Governance Policies; References; Chapter 11 -- What to do Forever; Continuing Efforts; Evaluate Effectiveness of Information Governance Policies
505
8
$a
Encouraging Accountability and Ownership of Information GovernanceTraining and Education of Employees About Information Governance; References; Chapter 12 -- Charting the Best Future Course for Your Organization; Information Governance Impacts All Facets of an Organization; Closing Thoughts; References; Appendix A; Information Security Personnel Check List; Appendix B; Appendix C; Works Cited; Index
520
$a
This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --
$c
Edited summary from book.
588
0
$a
Print version record.
650
0
$a
Knowledge management.
$3
563681
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
O'Shaughnessy, Michael,
$e
author
$3
3463202
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128002476
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9396113
電子資源
11.線上閱覽_V
電子書
EB HD30.2 .I2336 2015eb
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入