語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information governance and security ...
~
Iannarelli, John G.,
Information governance and security = protecting and managing your company's proprietary information /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information governance and security/ John Iannarelli, Michael O'Shaughnessy.
其他題名:
protecting and managing your company's proprietary information /
作者:
Iannarelli, John G.,
其他作者:
O'Shaughnessy, Michael,
出版者:
Oxford, England ;Elsevier, : 2015.,
面頁冊數:
1 online resource (xvi, 191 p.) :ill., graphs. :
標題:
Knowledge management. -
電子資源:
https://www.sciencedirect.com/science/book/9780128002476
ISBN:
9780128004067 (electronic bk.)
Information governance and security = protecting and managing your company's proprietary information /
Iannarelli, John G.,
Information governance and security
protecting and managing your company's proprietary information /[electronic resource] :John Iannarelli, Michael O'Shaughnessy. - Oxford, England ;Elsevier,2015. - 1 online resource (xvi, 191 p.) :ill., graphs.
Includes bibliographical references at the end of each chapters and index.
Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --
ISBN: 9780128004067 (electronic bk.)Subjects--Topical Terms:
558406
Knowledge management.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HD30.2 / .I2336 2015eb
Dewey Class. No.: 658.4/038
Information governance and security = protecting and managing your company's proprietary information /
LDR
:03979cam a2200313 a 4500
001
1000493
006
o d
007
cnu|unuuu||
008
201225s2015 enka ob 001 0 eng d
020
$a
9780128004067 (electronic bk.)
020
$a
0128004061 (electronic bk.)
020
$a
9780128002476
020
$a
0128002476
035
$a
(OCoLC)891397260
035
$a
EL2020312
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
UIU
$d
OCLCF
$d
CUI
$d
S4S
$d
STF
$d
B24X7
$d
COO
$d
OCLCQ
$d
LIV
$d
D6H
$d
LQU
$d
UHL
$d
VLB
$d
BRF
041
0
$a
eng
050
4
$a
HD30.2
$b
.I2336 2015eb
082
0 4
$a
658.4/038
$2
23
100
1
$a
Iannarelli, John G.,
$e
author.
$3
1293066
245
1 0
$a
Information governance and security
$h
[electronic resource] :
$b
protecting and managing your company's proprietary information /
$c
John Iannarelli, Michael O'Shaughnessy.
260
$a
Oxford, England ;
$a
Waltham, Massachusetts :
$b
Elsevier,
$c
2015.
300
$a
1 online resource (xvi, 191 p.) :
$b
ill., graphs.
504
$a
Includes bibliographical references at the end of each chapters and index.
505
0
$a
Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References
505
8
$a
Chapter 4 -- The Changing Corporate LandscapeToday's Cyber Environment; The Federal Government; The Private Sector; Why Should Corporate America Care?; References; Chapter 5 -- How Information Governance Fits in the New World; Issues in the New World; References; Chapter 6 -- The Human Element; Cyber; Physical Acts; References; Chapter 7 -- The Technical Side; The Benefits; Concerns Brought About by Technology; References; Chapter 8 -- Balancing Information Governance and Your Company's Mission; Policies; Factors to Consider; References
505
8
$a
Chapter 9 -- The Case for Information Governance from within Your OrganizationNegative Perceptions of Information Governance; Implementation; References; Chapter 10 -- What to do First; The Basics; How to Determine Information Governance Needs for Your Company; How to Create Information Governance Policies; Methods of Security to Support Information Governance; How to Implement Information Governance Policies; References; Chapter 11 -- What to do Forever; Continuing Efforts; Evaluate Effectiveness of Information Governance Policies
505
8
$a
Encouraging Accountability and Ownership of Information GovernanceTraining and Education of Employees About Information Governance; References; Chapter 12 -- Charting the Best Future Course for Your Organization; Information Governance Impacts All Facets of an Organization; Closing Thoughts; References; Appendix A; Information Security Personnel Check List; Appendix B; Appendix C; Works Cited; Index
520
$a
This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --
$c
Edited summary from book.
588
0
$a
Print version record.
650
0
$a
Knowledge management.
$3
558406
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
O'Shaughnessy, Michael,
$e
author
$3
1293067
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128002476
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入