Mapping Security
Addison-Wesley Educational Publishers Inc (Verlag)
978-0-321-30452-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This is a management-level book for companies and organizations that are (orwill be) doing business in more than one country. This distinction applies toincreasing numbers of corporations because remaining competitive dependsupon supply chains, customers, and outsourced operations that routinely mapacross the globe. Written in three sections, the book is designed to helpcompanies with security once they, or their extended organization, leave thecomfort of their home turf and encounter new rules, regulations, threats andcustoms. Mapping Security is woven together by the common goal of securebusiness in an entertaining and informative narrative style.
About the Author Tom Patterson is a business advisor in the areas of security, commerce, and governance. Patterson has been a successful international security and eCommerce partner at both KPMG and Deloitte, a strategy executive with IBM's Internet Division, and a director of security at MCC, Americas leading R&D consortium. Tom has been a board member of several public companies, has advised all three branches of the U.S. government on Internet and security policy, and is a trusted advisor to company executives around the world. Patterson regularly comments on the security issues of the day for CNBC and other major media outlets. His track record of success in large scale eCommerce, with three separate projects that have each generated over 500 million dollars online, has him in demand as an author, public speaker, board member, and business advisor. He currently resides in Pacific Palisades, California, with his wife and son. More information about the author is available at http://www.TPatterson.NET. © Copyright Pearson Education. All rights reserved.
Acknowledgments.
About the Author.
Foreword.
The Five Ws of Mapping Security.
1. The Historian and the Security Guy.
I. CHARTING A COURSE.
2. Why You Picked Up This Book.
3. Establishing Your Coordinates.
4. Building the Base.
5. Enabling Business and Enhancing Process.
6. Developing Radar.
7. Constant Vigilance.
II. REALITY, ILLUSION, AND THE SOUK.
8. Wells and the Security Guy Travel the Globe.
9. Europe.
Germany/Deutschland (.DE)
France (.FR)
The United Kingdom (.UK)
Ireland (.IE)
Belgium (.BE)
Denmark
Norway
Sweden
The Netherlands/Nederland (.NE)
Switzerland/Suisse (.CH)
Spain/Espania (.ES)
Italy/Italia (.IT)
Russia (.RU)
Czech Republic (.CZ)
10. The Middle East and Africa.
India (.IN)
Dubai (.AE)
Israel (.IL)
Saudi Arabia (.SA)
South Africa (.ZA)
11. The Americas.
Canada (.CA)
United States (.US)
Mexico (.MX)
Brazil (.BR)
Columbia (.CO)
Argentina (.AR)
Chile (.CL)
12. Asia Pacific.
China (.CN)
Singapore (.SG)
Australia (.AU)
Japan (.JP)
13. Outsourcing and Your Map.
III. WHOSE LAW DO I BREAK?
14. Mapping Solutions.
15. Mapping Law.
16. Mapping Technology.
17. Mapping Culture.
18. Mapping Your Future.
A. Local Security Resources by Country.
Index.
Erscheint lt. Verlag | 24.2.2005 |
---|---|
Verlagsort | New Jersey |
Sprache | englisch |
Maße | 181 x 234 mm |
Gewicht | 642 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-321-30452-7 / 0321304527 |
ISBN-13 | 978-0-321-30452-0 / 9780321304520 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich