Facebook Twitter Pinterest <Einbetten>
Gebraucht kaufen
EUR 4,06
Gebraucht: Sehr gut | Details
Zustand: Gebraucht: Sehr gut
Kommentar: Versand und Verkaufsabwicklung erfolgt über AMAZON!!
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Dieses Bild anzeigen

Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share (Englisch) Gebundene Ausgabe – Mai 2001

4,6 von 5 Sternen
5 Sterne
3
4 Sterne
2
3 Sterne
0
2 Sterne
0
1 Stern
0
4,6 von 5 Sternen 5 Kundenrezensionen auf Amazon.com

Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Gebundene Ausgabe
"Bitte wiederholen"
EUR 21,02 EUR 1,05
13 neu ab EUR 21,02 13 gebraucht ab EUR 1,05 1 Sammlerstück ab EUR 11,38
click to open popover

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

Produktbeschreibungen

Synopsis

This text brings the reader up to speed on E-business security issues and offers methods for protecting information assets. With the help of case studies, it describes an approach to the use of digital security as a front-office tool for building a company's reputation as well as customer loyalty.

Buchrückseite

A Practical Process for Evaluating Your Company's Digital Security Needs­­and Constructing an Effective, Affordable Defense

The powerful advantages that the World Wide Web provides for companies around the world­­with its unprecedented accessibility, speed, and integration­­also create powerful vulnerabilities. Security Transformation details how your company can limit its exposure to these risks while providing a digital environment that is conducive to expansion of its markets, growth of its business, and successful partnering with like-minded organizations.

The authors­­experienced consultants at KPMG, today's global leader in e-Business consulting and solutions­­show you how to construct a security environment designed to curtail undesirable intrusions, whether from external sources or from inside your own walls. Security Transformation provides detailed strategies to help you:

  • Evaluate security needs, factoring in actual activity-based solutions and costs
  • Put in place an effective response that can mitigate disruption or damage, plus identify and remedy intrusion after-effects
  • Integrate security technologies with existing corporate systems and strategies

Your company's reputation, customer loyalty, product development, and market value depend on its ability to provide effective digital security. Let Security Transformation show you how to evaluate the security of your entire enterprise, produce a realistic risk profile, and establish an appropriate enterprise security environment.

  • A survey reports that 90 percent of respondents have detected cyber attacks within the past 12 months­­with the top 250 averaging nearly $1 million in losses
  • A bored 15-year-old blocks access for hours to top global e-Businesses­­including Amazon, eBay, E*Trade, and others­­resulting in millions of dollars in lost revenue
  • Your company's computer system is infiltrated by a disgruntled former employee, who hijacks customer credit card numbers and company records­­along with your reputation

The first two of the above stories are based on fact. The third hasn't occurred­­yet. But how can you be sure that it won't?

Security Transformation shows you how to determine your company's biggest vulnerabilities, details the methods for assessing those vulnerabilities, then provides the tools you need to look beyond your current security environment to one that will serve your present and future needs in the most scalable, seamless, and least disruptive way. Accessible, non-technical, and jargon-free, this timely book presents a practical approach for ensuring your company's ability to take full advantage of the many profitable advantages of today's digital world while protecting itself against the unwanted intrusions that have become a fact of life.

Interviews, examples, case histories, and insights from the client files of KPMG illustrate the direct operational, financial, and marketing benefits of taking system security seriously. Covering everything from the psychological aspects of system security to the actual nuts and bolts details of instituting a structured Enterprise Security Architecture­­one that effectively supports your company's business strategies and objectives­­Security Transformation presents:

  • A technical framework for understanding Web security issues, and assessing security risks
  • Leadership and education guidelines so that security solutions are embraced by employees­­rather than resisted
  • Techniques to locate and implement anti-virus and intrusion detection systems that allow later expansion and scalability

As everything from retail marketing through internal corporate communication takes advantage of the tremendous efficiencies and cost advantages of the World Wide Web, computer network security is no longer a little-noticed, back-office responsibility­­it is among the most critical issues facing businesses today. Security Transformation looks at the issue from every angle, and acquaints business decision makers with the bottom-line issues of security they need to understand in order to effectively transact business in an increasingly digital world.

Alle Produktbeschreibungen

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta) (Kann Kundenrezensionen aus dem "Early Reviewer Rewards"-Programm beinhalten)

Amazon.com: 4.6 von 5 Sternen 5 Rezensionen
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Snappy, thoughtful and useful 13. Juli 2001
Von Ein Kunde - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
When I read the first chapter, I thought I had picked up a Clancy novel by mistake. The first section says "Are you scared yet?" You better believe it. The good news, though, is you can do something about it, and this book helps you make informed decisions about what to do. Definitely worth the price and more.
1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen A good managerial overview 31. März 2002
Von J. J. Kwashnak - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
Security Transformation is an excellent book for a manager, "C" officer or other less technical readers. The authors take care to present the issues of digital security in an easy to read, non-jargon laden manner. And for the jargon that is put in the book, there is a glossary at the end to help keep everyone on the same page. This is the book you hand on to executives who just don't understand why security is important. It looks at the effect technology security has upon the ability to secure business and the ability to not be part of a larger problem, such as a Distributed Denial of Service attack. The warnings are real, but are not played for sensationalism, cooly explaining what threats are out there and what they mean to "you." I don't think I learned much I hadn't known already, but I did find a nice coherent package to introduce others to the risks, with significantly less amounts of techno-jargon or offputting technical details. A quick read and a good overview.
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Highly Recommended! 19. November 2001
Von Rolf Dobelli - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
Mary Pat McCarthy and Stuart Campbell provide just enough technical information to help you understand the electronic security risks your company faces without falling into a complete course in computer programming and Internet data transmission. The authors' most valuable contribution is their structured plan for evaluating your computer system's security and creating security architecture. We [...] direct those who want a more advanced treatment of computer security issues to the book's two appendices, which review some of the same ground in more detail. This book is an important read for CEOs and an essential resource for anyone responsible for corporate security or risk management.
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen A Thoughtful and Interesting Discussion 8. Juni 2001
Von Ein Kunde - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
I read a lot of management books and I'm not easily impressed, but Security Transformation is a very good read. The authors have taken an issue that on the face of it seems arcane and dull, and woven an interesting and readable narrative that details the impact of information security on a company's brand, reputation and bottom line. Worth picking up.
4.0 von 5 Sternen A good managerial overview 31. März 2002
Von J. J. Kwashnak - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
Security Transformation is an excellent book for a manager, "C" officer or other less technical readers. The authors take care to present the issues of digital security in an easy to read, non-jargon laden manner. And for the jargon that is put in the book, there is a glossary at the end to help keep everyone on the same page. This is the book you hand on to executives who just don't understand why security is important. It looks at the effect technology security has upon the ability to secure business and the ability to not be part of a larger problem, such as a Distributed Denial of Service attack. The warnings are real, but are not played for sensationalism, cooly explaining what threats are out there and what they mean to "you." I don't think I learned much I hadn't known already, but I did find a nice coherent package to introduce others to the risks, with significantly less amounts of techno-jargon or offputting technical details. A quick read and a good overview.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.