Information Technology Security: Advice from Experts

Information Technology Security: Advice from Experts

Copyright: © 2004 |Pages: 350
ISBN13: 9781591402473|ISBN10: 1591402476|EISBN13: 9781591402480
DOI: 10.4018/978-1-59140-247-3
Cite Book Cite Book

MLA

Oliva, Lawrence, editor. Information Technology Security: Advice from Experts. IGI Global, 2004. https://doi.org/10.4018/978-1-59140-247-3

APA

Oliva, L. (Ed.). (2004). Information Technology Security: Advice from Experts. IGI Global. https://doi.org/10.4018/978-1-59140-247-3

Chicago

Oliva, Lawrence, ed. Information Technology Security: Advice from Experts. Hershey, PA: IGI Global, 2004. https://doi.org/10.4018/978-1-59140-247-3

Export Reference

Mendeley
Favorite Full-Book Download

As the value of the information portfolio has increased, IT security has changed from a product focus to a business management process. Today, IT security is not just about controlling internal access to data and systems but managing a portfolio of services including wireless networks, cyberterrorism protection and business continuity planning in case of disaster. With this new perspective, the role of IT executives has changed from protecting against external threats to building trusted security infrastructures linked to business processes driving financial returns. As technology continues to expand in complexity, databases increase in value, and as information privacy liability broadens exponentially, security processes developed during the last century will not work. IT leaders must prepare their organizations for previously unimagined situations. IT security has become both a necessary service and a business revenue opportunity.

Balancing both perspectives requires a business portfolio approach to managing investment with income, user access with control, and trust with authentication. Managing Data Mining: Advice from Experts is a collection of interviews of corporate IT security practitioners offering various viewpoint on successes and failures in managing IT security in organizations. (This book is a release under the IT Solution Series.)

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgments
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Governance Issues  (pages 13-13)
Governance Issues
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Architecture Issues  (pages 94-95)
Architecture Issues
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Technology Issues  (pages 107-109)
Technology Issues
This content has been removed at the discretion of the publisher and the editors.
Back Materials
About the Authors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.