Managing cyber-security resources : A cost-benefit analysis
Breaches in cybersecurity are on the rise. Between 1998 and 2003, reported cybersecurity incidents increased over thirty-fold. Well-publicized information security breaches have made cybersecurity a critical and timely topic for the general public, as well as for corporations, not-for-profit organiz...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | Undetermined |
Được phát hành: |
New York
McGraw-Hill
2006
|
Những chủ đề: | |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Trung tâm Học liệu Trường Đại học Cần Thơ |
---|
LEADER | 02045nam a2200229Ia 4500 | ||
---|---|---|---|
001 | CTU_138356 | ||
008 | 210402s9999 xx 000 0 und d | ||
020 | |c 35.84 | ||
082 | |a 658.4 | ||
082 | |b G662 | ||
100 | |a Gorden, Lawrence A. | ||
245 | 0 | |a Managing cyber-security resources : | |
245 | 2 | |b A cost-benefit analysis | |
245 | 0 | |c Lawrence A. Gordon, Martin P. Loeb | |
260 | |a New York | ||
260 | |b McGraw-Hill | ||
260 | |c 2006 | ||
520 | |a Breaches in cybersecurity are on the rise. Between 1998 and 2003, reported cybersecurity incidents increased over thirty-fold. Well-publicized information security breaches have made cybersecurity a critical and timely topic for the general public, as well as for corporations, not-for-profit organizations and the government. As a result, organizations need to be able to make the business case for spending the right amount on cybersecurity. They also need to know how to efficiently allocate these funds to specific cybersecurity activities. Managing Cybersecurity Resources is the first book to specifically focus on providing a framework for understanding how to use economic and financial management tools in helping to address these important issues. The McGraw-Hill Homeland Security Series draws on frontline government, military, and business experts to detail what individuals and businesses can and must do to understand and move forward in this challenging new environment. Books in this timely and noteworthy series will cover everything from the balance between freedom and safety to strategies for protection of intellectual, business, and personal property to structures and goals of terrorist groups including Al-Qaeda. | ||
650 | |a Business,Computer security,Information technology,Data protection,Kinh doanh | ||
650 | |x Data processing,Security measures,Security measures,Xử lý dữ liệu,Sự đo lường độ bảo mật | ||
904 | |i Nguyễn Thị Kiều Đượm | ||
980 | |a Trung tâm Học liệu Trường Đại học Cần Thơ |