Automation of clerical processes makes information systems more vulnerable, because they no longer require the prudent manual checks and balances which were once an unspoken part of the job. When combined with the pressures of cost of implementation and timescale, this has meant that few, if any, security controls have been built into these systems. This book examines modern systems of information security and how, in the modern office environment, security systems have often been overlooked. The authors argue that it is ...
Read More
Automation of clerical processes makes information systems more vulnerable, because they no longer require the prudent manual checks and balances which were once an unspoken part of the job. When combined with the pressures of cost of implementation and timescale, this has meant that few, if any, security controls have been built into these systems. This book examines modern systems of information security and how, in the modern office environment, security systems have often been overlooked. The authors argue that it is often the case that security deficits are not detected until a breach of security occurs. This means that security systems are not implemented until a breach of security occures. Information sources have consequently become more attractive for criminal and terrorist groups who are then in a position to demand high rewards for minimal effort. A single compromised password can lead to fraud involving electronic funds transfer (EFT), or to exposure of corporate secrets through industrial espionage. This book is designed to help managers to become acquainted with the risks involved and to help them to minimize the chance of an unwanted incident and reduce the effect of any damage. The first chapter provides the foundation upon which subsequent sections are built, but the authors do not expect the work to be read in sequence, from cover to cover, as a novel. Hence a question and answer format has been adopted.
Read Less
Add this copy of Information Security Handbook to cart. $14.50, good condition, Sold by Reuseabook rated 4.0 out of 5 stars, ships from Gloucester, GLOS, UNITED KINGDOM, published 1994 by Nature Publishing Group.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Dispatched, from the UK, within 48 hours of ordering. This book is in good condition but will show signs of previous ownership. Please expect some creasing to the spine and/or minor damage to the cover. Damaged book. Slightly damaged in some way typically, a grazed corner or torn cover.
Add this copy of Information Security Handbook to cart. $49.84, fair condition, Sold by Anybook rated 5.0 out of 5 stars, ships from Lincoln, UNITED KINGDOM, published 1991 by Macmillan.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
This is an ex-library book and may have the usual library/used-book markings inside. This book has hardback covers. Book contains pencil markings. In fair condition, suitable as a study copy. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item, 1400grams, ISBN: 0333511727.