000012769 000__ 03187cam\a2200673\i\4500 000012769 001__ 12769 000012769 003__ SzGeWIPO 000012769 005__ 20230420170041.0 000012769 008__ 020403s2002\\\\nyu\\\\\rb\\\u001\0\eng\d 000012769 020__ $$z9780849312397$$qpaperback 000012769 020__ $$z9780203972892$$qelectronic book 000012769 020__ $$z9781420031478$$qelectronic book 000012769 020__ $$z9781466525078 000012769 020__ $$z9780367805760$$qelectronic book 000012769 035__ $$a(wipo)(CD )02-0229 000012769 035__ $$a(OCoLC)47705864 000012769 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000012769 041__ $$aeng 000012769 050_4 $$aTK5105.59$$b.S435 2002 000012769 08204 $$a005.8$$221 000012769 084__ $$aD 80 MCB.S 000012769 090__ $$c13338$$d13338 000012769 1001_ $$aMcbride, Patrick;$$aPatilla, Jody;$$aRobinson, Craig;$$aThermos, Peter;$$aMoser, Edward P. 000012769 24510 $$aSecure Internet Practices :$$bBest Practices for Securing Systems in the Internet and e-Business Age. 000012769 264_1 $$aLondon, United Kingdom :$$bTaylor & Francis Ltd,$$c2002. 000012769 300__ $$axv, 209 pages ;$$c[28] cm. 000012769 336__ $$atext$$btxt$$2rdacontent 000012769 337__ $$aunmediated$$bn$$2rdamedia 000012769 338__ $$avolume$$bnc$$2rdacarrier 000012769 4901_ $$aELECTRICALENGINEERINGnetBASE 000012769 504__ $$aIncludes bibliographical references and index. 000012769 5050_ $$aChapter Introduction -- chapter 1 The Information Security Program -- chapter 2 Developing an Information Security Policy -- chapter 3 Web and e-Commerce Security. 000012769 520__ $$aIs your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted with a whole new set of security problems. Dealing with the risks of Internet applications and e-commerce requires new ways of thinking about security. Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age presents an overview of security programs, policies, goals, life cycle development issues, infrastructure, and architecture aimed at enabling you to effectively implement security at your organization. In addition to discussing general issues and solutions, the book provides concrete examples and templates for crafting or revamping your security program in the form of an Enterprise-Wide Security Program Model, and an Information Security Policy Framework. Although rich in technical expertise, this is not strictly a handbook of Internet technologies, but a guide that is equally useful for developing policies, procedures, and standards. The book touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age shows you how to create a workable security program to protect your organization's Internet risk. 000012769 650_0 $$aBusiness$$xData processing$$xSecurity measures. 000012769 650_0 $$aBusiness -- Data processing -- Security measures. 000012769 650_0 $$aInternet. 000012769 650_0 $$aInternet$$xLaw and legislation. 000012769 650_4 $$aWEB AND E-COMMERCE SECURITY 000012769 650_4 $$aINTERNET SECURITY 000012769 650_4 $$aSECURITY POLICY 000012769 650_4 $$aINFORMATION SCIENCE (DOCUMENTATION) : DATA COMMUNICATIONS : INTERNET 000012769 650_6 $$aGestion$$xInformatique$$xSécurité$$xMesures. 000012769 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 000012769 830_0 $$aELECTRICALENGINEERINGnetBASE. 000012769 942__ $$cMON 000012769 980__ $$aBIB 000012769 999__ $$c13338$$d13338