Autor: John Sileo
Wydawca: Wiley
Dostępność: 3-6 tygodni
Cena: 148,05 zł
Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.
ISBN13: |
9780470583890 |
ISBN10: |
0470583894 |
Autor: |
John Sileo |
Oprawa: |
Hardback |
Rok Wydania: |
2010-09-17 |
Ilość stron: |
256 |
Wymiary: |
235x163 |
Tematy: |
KM |
Bulletproof your organization against data breach, identity theft, and corporate espionage
In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business.
By interlacing his personal experience with cutting–edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must–read for any individual with a Social Security Number and any business leader who doesn′t want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach.
Protect your net worth and bottom line using the 7 Mindsets of a Spy
Accumulate Layers of PrivacyEliminate the SourceDestroy Data RiskLock Your AssetsEvaluate the OfferInterrogate the EnemyMonitor the Signs
In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one–stop guide to protecting what′s most important and most at risk–your essential business and personal data.
Spis treści:
Acknowledgements.
Part I: Boot Camp – Privacy Means Profit.
1.1 Motivate the Troops.
1.2 Define the Problem.
1.3 Engage the Brain.
Part II: Basic Training – Think Like a Spy.
2.1 Eliminate the Source.
2.2 Destroy
the Data.
2.3 Secure the Systems.
2.4 Lock the Docs.
2.5 Evaluate the Risk.
2.6 Interrogate the Enemy.
2.7 Monitor the Signs.
Part III: Field Combat – Target the Enemy.
3.1 Targeting Strategies: Accumulate, Prioritize, and Adapt.
3.2 Defend Online Identity – Social Networking & The Cloud.
3.3 Protect Mobile Data – Laptop Responsibility.
3.4 Travel with Care –Business Trips & Vacations .
3.5 Recover Your Identity – When All Else Fails.
3.6 The Privacy Calendar – Prioritizing Your Attack.
Further Resources.
Endnotes.
About the Author.
Książek w koszyku: 0 szt.
Wartość zakupów: 0,00 zł
Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.
Al. Pokoju 29b/22-24
31-564 Kraków
Siedziba Księgarni
ul. Kordylewskiego 1
31-542 Kraków
+48 12 410 5991
+48 12 410 5987
+48 12 410 5989
Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.
© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.
Projekt i wykonanie: Alchemia Studio Reklamy