Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1329
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAjmani, Neelesh. ;en_US
dc.contributor.authorKumar, Dinesh. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:40Z-
dc.date.available2020-05-17T08:27:40Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484230992 ;en_US
dc.identifier.isbn9781484230985 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1329-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9781484230985. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractProactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What Youeell Learn: Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring,eand managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models. ;en_US
dc.description.statementofresponsibilityby Neelesh Ajmani, Dinesh Kumar.en_US
dc.description.tableofcontentsChapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.-e. ;en_US
dc.format.extentXVIII, 168 p. 39 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484230992.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.titleAchieving and Sustaining Secured Business Operationsen_US
dc.title.alternativeAn Executiveees Guide to Planning and Management /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484230992.pdf5.16 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAjmani, Neelesh. ;en_US
dc.contributor.authorKumar, Dinesh. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:40Z-
dc.date.available2020-05-17T08:27:40Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484230992 ;en_US
dc.identifier.isbn9781484230985 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1329-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9781484230985. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractProactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What Youeell Learn: Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring,eand managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models. ;en_US
dc.description.statementofresponsibilityby Neelesh Ajmani, Dinesh Kumar.en_US
dc.description.tableofcontentsChapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.-e. ;en_US
dc.format.extentXVIII, 168 p. 39 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484230992.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.titleAchieving and Sustaining Secured Business Operationsen_US
dc.title.alternativeAn Executiveees Guide to Planning and Management /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484230992.pdf5.16 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAjmani, Neelesh. ;en_US
dc.contributor.authorKumar, Dinesh. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:40Z-
dc.date.available2020-05-17T08:27:40Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484230992 ;en_US
dc.identifier.isbn9781484230985 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1329-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionPrinted edition: ; 9781484230985. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractProactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What Youeell Learn: Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring,eand managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models. ;en_US
dc.description.statementofresponsibilityby Neelesh Ajmani, Dinesh Kumar.en_US
dc.description.tableofcontentsChapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.-e. ;en_US
dc.format.extentXVIII, 168 p. 39 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484230992.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.titleAchieving and Sustaining Secured Business Operationsen_US
dc.title.alternativeAn Executiveees Guide to Planning and Management /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484230992.pdf5.16 MBAdobe PDFThumbnail
Preview File