Table of contents for Protecting business information : a manager's guide / James A. Schweitzer.


Bibliographic record and links to related information available from the Library of Congress catalog


Information from electronic data provided by the publisher. May be incomplete or contain other coding.


Counter Part I - THE CASE FOR INFORMATION SECURITY: 1 Some Background on Information Protection 2 The Management Issue: Why bother with Information Security? 3 Information Threats and Vunerabilities Part II - PROTECTION OF INFORMATION:CONCEPTS AND METHODS: 4 Information Concepts 5 Establishing Proprietary Rights to Information 6 Information Protection Methods 7 Securing the Information Environments 8 Computer Security 9 Communications Security Part III - INFORMATION SECURITY MANAGEMENT: 10 Information Security in the Business Enterprise 11 Relating Information Security Investment to Business Needs 12 Information Security Directives 13 Setting Up the Information Security Program 14 Administration and Maintenance of Information Security Part IV - A COMPENDIUM OF TERMS WITH ISSUES, CONCERNS, AND SOLUTIONS.

Library of Congress subject headings for this publication: Trade secrets, Data protection, Business intelligence, Electronic data processing departments Security measures, Computer security, Information resources management