語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information governance and securityp...
~
Iannarelli, John G.,
Information governance and securityprotecting and managing your company's proprietary information /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information governance and securityJohn Iannarelli, Michael O'Shaughnessy.
其他題名:
protecting and managing your company's proprietary information /
作者:
Iannarelli, John G.,
其他作者:
O'Shaughnessy, Michael,
出版者:
Oxford, England ;Elsevier,2015.
面頁冊數:
1 online resource (xvi, 191 p.) :ill., graphs.
標題:
Knowledge management.
電子資源:
https://www.sciencedirect.com/science/book/9780128002476
ISBN:
9780128004067 (electronic bk.)
Information governance and securityprotecting and managing your company's proprietary information /
Iannarelli, John G.,
Information governance and security
protecting and managing your company's proprietary information /[electronic resource] :John Iannarelli, Michael O'Shaughnessy. - Oxford, England ;Elsevier,2015. - 1 online resource (xvi, 191 p.) :ill., graphs.
Includes bibliographical references at the end of each chapters and index.
Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --
ISBN: 9780128004067 (electronic bk.)Subjects--Topical Terms:
200613
Knowledge management.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: HD30.2 / .I2336 2015eb
Dewey Class. No.: 658.4/038
Information governance and securityprotecting and managing your company's proprietary information /
LDR
:03979cmm a2200313 a 4500
001
582392
006
o d
007
cnu|unuuu||
008
210121s2015 enka ob 001 0 eng d
020
$a
9780128004067 (electronic bk.)
020
$a
0128004061 (electronic bk.)
020
$a
9780128002476
020
$a
0128002476
035
$a
(OCoLC)891397260
035
$a
EL2020312
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
UIU
$d
OCLCF
$d
CUI
$d
S4S
$d
STF
$d
B24X7
$d
COO
$d
OCLCQ
$d
LIV
$d
D6H
$d
LQU
$d
UHL
$d
VLB
$d
BRF
041
0
$a
eng
050
4
$a
HD30.2
$b
.I2336 2015eb
082
0 4
$a
658.4/038
$2
23
100
1
$a
Iannarelli, John G.,
$e
author.
$3
872691
245
1 0
$a
Information governance and security
$h
[electronic resource] :
$b
protecting and managing your company's proprietary information /
$c
John Iannarelli, Michael O'Shaughnessy.
260
$a
Oxford, England ;
$a
Waltham, Massachusetts :
$b
Elsevier,
$c
2015.
300
$a
1 online resource (xvi, 191 p.) :
$b
ill., graphs.
504
$a
Includes bibliographical references at the end of each chapters and index.
505
0
$a
Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
505
8
$a
Chapter 4 -- The Changing Corporate LandscapeToday's Cyber Environment; The Federal Government; The Private Sector; Why Should Corporate America Care?; References; Chapter 5 -- How Information Governance Fits in the New World; Issues in the New World; References; Chapter 6 -- The Human Element; Cyber; Physical Acts; References; Chapter 7 -- The Technical Side; The Benefits; Concerns Brought About by Technology; References; Chapter 8 -- Balancing Information Governance and Your Company's Mission; Policies; Factors to Consider; References
505
8
$a
Chapter 9 -- The Case for Information Governance from within Your OrganizationNegative Perceptions of Information Governance; Implementation; References; Chapter 10 -- What to do First; The Basics; How to Determine Information Governance Needs for Your Company; How to Create Information Governance Policies; Methods of Security to Support Information Governance; How to Implement Information Governance Policies; References; Chapter 11 -- What to do Forever; Continuing Efforts; Evaluate Effectiveness of Information Governance Policies
505
8
$a
Encouraging Accountability and Ownership of Information GovernanceTraining and Education of Employees About Information Governance; References; Chapter 12 -- Charting the Best Future Course for Your Organization; Information Governance Impacts All Facets of an Organization; Closing Thoughts; References; Appendix A; Information Security Personnel Check List; Appendix B; Appendix C; Works Cited; Index
520
$a
This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --
$c
Edited summary from book.
588
0
$a
Print version record.
650
0
$a
Knowledge management.
$3
200613
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
O'Shaughnessy, Michael,
$e
author
$3
872692
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128002476
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000187235
電子館藏
1圖書
電子書
EB HD30.2 .I2336 2015eb 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://www.sciencedirect.com/science/book/9780128002476
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入