Protecting business information : a manager's guide / James A Schweitzer.
Publisher: [S.l.] : Butterworth-Heinemann, 1995Description: 199 p. ; 24 cmISBN: 0750696583; 9780750696586DDC classification: 658.472 Online resources: Amazon.com | Amazon customer reviews Summary: 'Protecting Business Information: A Manager's guide' is an introduction to the information resource, its sensitivity, value and susceptibility to risk. This book provides an outline for a business information security program and provides clear answers to the why and how of information protection. Protecting Business Information' provides detailed processes for analysis, leading to a complete and adequate information classification. It includes a thorough description of the methods for information classification. A valuable guide based on the author's fifteen year's experience in building and implementing information security programs for large, worldwide businesses. Provides a basis for the reasoning behind information protection processes. Suggests practical means for aligning an information security investment with business needs.| Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|
Book
|
Central Library (CL) | Central Library (CL) | 658.472 SCH (Browse shelf) | Available | NBS1267 |
Hardcover.
'Protecting Business Information: A Manager's guide' is an introduction to the information resource, its sensitivity, value and susceptibility to risk. This book provides an outline for a business information security program and provides clear answers to the why and how of information protection. Protecting Business Information' provides detailed processes for analysis, leading to a complete and adequate information classification. It includes a thorough description of the methods for information classification. A valuable guide based on the author's fifteen year's experience in building and implementing information security programs for large, worldwide businesses. Provides a basis for the reasoning behind information protection processes. Suggests practical means for aligning an information security investment with business needs.

Book
There are no comments on this title.