Table of contents for Protecting business information : a manager's guide / James A. Schweitzer.
Bibliographic record and links to related information available from the Library of Congress catalog
Information from electronic data provided by the publisher. May be incomplete or contain other coding.
Part I - THE CASE FOR INFORMATION SECURITY: 1 Some Background on Information Protection
2 The Management Issue: Why bother with Information Security? 3 Information Threats and Vunerabilities
Part II - PROTECTION OF INFORMATION:CONCEPTS AND METHODS: 4 Information Concepts
5 Establishing Proprietary Rights to Information
6 Information Protection Methods
7 Securing the Information Environments
8 Computer Security
9 Communications Security
Part III - INFORMATION SECURITY MANAGEMENT: 10 Information Security in the Business Enterprise
11 Relating Information Security Investment to Business Needs
12 Information Security Directives
13 Setting Up the Information Security Program
14 Administration and Maintenance of Information Security
Part IV - A COMPENDIUM OF TERMS WITH ISSUES, CONCERNS, AND SOLUTIONS.
Library of Congress subject headings for this publication: Trade secrets, Data protection, Business intelligence, Electronic data processing departments Security measures, Computer security, Information resources management