LEADER 01463nam--2200469---450- 001 990000771680203316 005 20091215102626.0 010 $a88-13-16443-2 035 $a0077168 035 $aUSA010077168 035 $a(ALEPH)000077168USA01 035 $a0077168 100 $a20011126d1988----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a<> truffa$fAttilio Maggini 210 $aPadova$cCEDAM$d1988 215 $aVII, 144 p.$d22 cm 225 2 $aGiurisprudenza penale$v2 410 0$12001$aGiurisprudenza penale$v2 606 0 $aTruffa 676 $a346.45036 700 1$aMAGGINI,$bAttilio$0405278 801 0$aIT$bsalbc$gISBD 912 $a990000771680203316 951 $aXXVI.1. Coll. 8/ 2 (COLL HOA 2)$b65993 E.C.$cXXVI.1. Coll. 8/ 2 (COLL HOA)$d00253633 951 $aXXVI.1. Coll. 8/ 2a (COLL HOA 2 )$b67102 E.C.$cXXVI.1. Coll. 8/ 2a (COLL HOA)$d00253634 951 $aSANT.7 8 22$b336 DDPG$cSANT.7 959 $aBK 969 $aGIU 969 $aDDPG 979 $aPATTY$b90$c20011126$lUSA01$h1542 979 $aPATTY$b90$c20020325$lUSA01$h1741 979 $c20020403$lUSA01$h1724 979 $aPATRY$b90$c20040406$lUSA01$h1653 979 $aDDPG1$b90$c20060824$lUSA01$h1302 979 $aDDPG1$b90$c20061106$lUSA01$h1750 979 $aDDPG1$b90$c20070215$lUSA01$h1553 979 $aRSIAV4$b90$c20091215$lUSA01$h1026 996 $aTruffa$9577484 997 $aUNISA LEADER 05475nam 2200697 a 450 001 9910457720903321 005 20200520144314.0 010 $a1-281-03760-5 010 $a9786611037604 010 $a0-08-054626-9 035 $a(CKB)1000000000349714 035 $a(EBL)299507 035 $a(OCoLC)173273521 035 $a(SSID)ssj0000077910 035 $a(PQKBManifestationID)11125911 035 $a(PQKBTitleCode)TC0000077910 035 $a(PQKBWorkID)10060358 035 $a(PQKB)10176811 035 $a(PQKBManifestationID)16030829 035 $a(PQKB)24966197 035 $a(MiAaPQ)EBC299507 035 $a(Au-PeEL)EBL299507 035 $a(CaPaEBR)ebr10186765 035 $a(CaONFJC)MIL103760 035 $a(EXLCZ)991000000000349714 100 $a20070906d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity convergence$b[electronic resource] $emanaging enterprise security risk /$fDave Tyson 210 $aAmsterdam ;$aBoston $cElsevier/Butterworth-Heinemann$dc2007 215 $a1 online resource (232 p.) 300 $aDescription based upon print version of record. 311 $a0-7506-8425-9 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Security Convergence; Copyright Page; Table of Contents; Foreword; Preface; Acknowledgments; Introduction; Section 1: Security To Date; Chapter 1: What is Security Convergence?; Key Concepts of Security Convergence; References; Chapter 2: Why Should You Care?; Rapid Expansion of the Enterprise Ecosystem; Value Migration from Physical to Information-Based and Intangible Assets; New Protective Technologies are Blurring Functional Boundaries; New Compliance And Regulatory Regimes; Continuing Pressure To Reduce Cost; Why Should You Really Care?; References 327 $aChapter 3: Cultural DifferencesSocial Differences; Physical Security Departments; Information Technology Security Departments; Reference; Section 2: The Changing of The Guard; Chapter 4: Changing the Threat Paradigm; Chapter 5: Changing the Security Environment; The Threats have Converged; Security Governance Structures; Chapter 6: Changing the Business Model; Chapter 7: The Ever-Advancing Microchip; Quantum Computing; Reference; Chapter 8: Leveraging Technology; Velocity of Recovery; References; Section 3: The New World; Chapter 9: Disruptive Technology and Other Stuff 327 $aAccess to Information is EasierMassive Distribution and A Global Footprint; Ability to Automate Attacks; Interconnectivity of Devices; Massive Reliance on Homogeneous Protocols; Very Few End-To-End Security Solutions; Historical Measurements of Business Success are Based on Quarterly Profit and Revenue; The Need to Feed the Beast; Chapter 10: The Need for Education; Chapter 11: Cyber Crime: A Pervasive Threat; Reference; Chapter 12: How These Groups Can Help Each Other; Section 4: Getting From Here To There; Chapter 13: How to Change; Acquire an Executive-Level Sponsor; Draft the New Vision 327 $aHave a Solid Change Management PlanAttain Senior Management Buy-In; Strategic Review or Inventory of Assets; Completely Separate Networks; Chapter 14: The Process Approach; Chapter 15: The Organization Size Approach; Small Companies; Medium-Sized Organizations; Large Organizations; Investigations; Chapter 16: The Methodological Approach; Step 1. Project Kick-Off Meeting; Step 2. Data Gathering; Step 3. Information Analysis; Step 4. Solution Design; Step 5. Recommendations; Step 6. Stakeholder Education Sessions; Step 7. Quick Wins; Step 8. Do Not Get Married to the Whole Idea of Convergence 327 $aStep 9. TrainingChapter 17: Potential Benefits; Risk Factors; Business Process Factors; Human Factors; Chapter 18: Security Convergence as Strategic Differentiator; Reference; Chapter 19: The Human Resources Perspective; Meeting the Human Resource Challenges of a Converged Organization; The ""Converged Chief Security Officer""; Recruiting and Selecting the Right Chief Security Officer; Building the Converged Security Department; Different Perspectives, Different Questions; Section 5: Sustainability; Chapter 20: Integrated Threat and Event Reporting; Chapter 21: Change Management 327 $aChapter 22: Resistance 330 $aSecurity Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security soluti 606 $aBusiness enterprises$xSecurity measures 606 $aRisk management 606 $aComputer security 608 $aElectronic books. 615 0$aBusiness enterprises$xSecurity measures. 615 0$aRisk management. 615 0$aComputer security. 676 $a658.4/7 676 $a658.47 700 $aTyson$b Dave$01043358 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910457720903321 996 $aSecurity convergence$92468278 997 $aUNINA