AUD Library Catalog

Normal view MARC view

Securing e-business systems : (Record no. 13578)

MARC details
000 -LEADER
fixed length control field 05710cam a2200409 a 4500
001 - CONTROL NUMBER
control field ocm12850766
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240430143954.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 050915s2002 nyua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2002284328
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA2-Y9966
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471072982
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocm48931786
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Transcribing agency UKM
Modifying agency TXH
-- TXA
-- OCLCQ
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.32
Item number .B73 2002
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) HF 5548.32 .B73 2002
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Braithwaite, Timothy,
Dates associated with a name 1942-
9 (RLIN) 57650
245 10 - TITLE STATEMENT
Title Securing e-business systems :
Remainder of title a guide for managers and executives /
Statement of responsibility, etc Timothy Braithwaite.
246 3# - VARYING FORM OF TITLE
Title proper/short title Securing e business systems :
Remainder of title a guide for managers and executives.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc c2002.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 272 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographic references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Electronic Business Systems Security -- How Is E-Business Security Defined? -- Can E-Business Security Be Explained More Simply? -- Is E-Business Security Really Such a Big Deal? -- Is E-Business Security More Important Than Other Information Technology Initiatives? -- How Does an Organization Get Started? -- Instead of Playing "Catch-Up," What Should an Organization Be Doing to Design E-Business Systems That Are Secure in the First Place? -- E-Business Systems and Infrastructure Support Issues -- E-Business Defined -- A Short History of E-Business Innovations -- The Need for Secure E-Business Systems -- Software: The Vulnerable Underbelly of Computing -- The Interoperability Challenge and E-Business Success -- E-Business Security: An Exercise in Trade-Offs -- Few Systems Are Designed to Be Secure -- Security Weaknesses in E-Business Infrastructure and "Best Practices" Security -- Fundamental Technical Security Threats -- The Guiding Principles of Protection -- "Best Practice" Prevention, Detection, and Countermeasures and Recovery Techniques -- Managing E-Business Systems and Security -- Misconceptions and Questionable Assumptions -- Managing E-Business Systems as a Corporate Asset -- E-Business Security Program Management -- A "Just-in-Time" Strategy for Securing the E-Business System: The Role for Security Monitoring and Incident Response -- The Current State of E-Business Security -- Standard Requirements of an E-Business Security Strategy -- A New Security Strategy -- The Crucial Role of Security Monitoring and Incident Response to the Securing of E-Business Systems -- The Current State of Intrusion Detection Systems (IDS) -- Defining a Cost-Effective Security Monitoring and Incident Response Capability -- Alternatives to Building "Your Own" Security Monitoring and Incident Response Capability -- Designing and Delivering Secured E-Business Application Systems -- Past Development Realities -- Contemporary Development Realities -- Developing Secured E-Business Systems -- Using the SDR Framework -- Choosing a Systems Development Methodology That Is Compatible with the SDR Framework -- Participants in the Identification of Security and Integrity Controls -- Importance of Automated Tools -- A Cautionary Word About New Technologies -- Justifying E-Business Security and the Security Management Program -- The "Quantifiable" Argument -- Emerging "Nonquantifiable" Arguments -- Benefits Justifications Must Cover Security Program Administration -- Computers, Software, Security, and Issues of Liability -- Evolving Theories of Responsibility -- Likely Scenarios -- How Might a Liability Case Unfold? -- Questions to Be Asked to Ensure That Reasonable Care Has Been Taken in Developing a Secure E-Business System -- The National Critical Infrastructure Protection (CIP) Initiative -- The Problem of Dependency -- Critical Infrastructure Protection (CIP) Purpose, Directives, Organizations, and Relationships -- Frequently Asked Questions About the IT-ISAC -- Critical Information Infrastructure Protection Issues that Need Resolution -- Y2K Lessons Learned and Their Importance for E-Business Security -- Systems Development Review Framework for E-Business Development Projects -- A Corporate Plan of Action for Securing E-Business Systems (Sample) -- E-Business Risk Management Review Model Instructions for Use.
520 ## - SUMMARY, ETC.
Summary, etc Today's e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts to meet a company's changing security needs.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic commerce
General subdivision Security measures.
9 (RLIN) 74484
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Computer networks
-- Security measures.
9 (RLIN) 74485
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures.
9 (RLIN) 74486
852 ## - LOCATION/CALL NUMBER
-- p39.95
-- 10-26-2002
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a
b 08-12-10
c 08-06-10
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- audmc
Operator's initials, OID (RLIN) 10-26-02
Cataloger's initials, CIN (RLIN) m
First Date, FD (RLIN) a
-- -
-- eng
-- nyu
-- 0
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
925 0# -
-- acquire
-- 2 shelf copies
-- policy default
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
g 0
i 633438
j 0
l audmc
n Copy Type:01 - Books
o -
p 146.82
q -
r -
s -
t 1
u 0
v 0
w 0
x 0
y i10191513
z 08-06-10
Holdings
Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
  Library of Congress Classification Copy Type:01 - Books     American University in Dubai American University in Dubai Main Collection 2010-08-06 146.82   HF 5548.32 .B73 2002 633438 2023-11-08 146.82 2015-07-25 Books
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions