did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780321304520

Mapping Security The Corporate Security Sourcebook for Today's Global Economy

by ;
  • ISBN13:

    9780321304520

  • ISBN10:

    0321304527

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2004-12-14
  • Publisher: Addison-Wesley Professional
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $44.99

Summary

Compelling and practical view of computer security in a multinational environment - for everyone who does business in more than one country.

Author Biography

About the Author

Tom Patterson is a business advisor in the areas of security, commerce, and governance.

Patterson has been a successful international security and eCommerce partner at both KPMG and Deloitte, a strategy executive with IBM's Internet Division, and a director of security at MCC, Americas leading R&D consortium. Tom has been a board member of several public companies, has advised all three branches of the U.S. government on Internet and security policy, and is a trusted advisor to company executives around the world.

Patterson regularly comments on the security issues of the day for CNBC and other major media outlets. His track record of success in large scale eCommerce, with three separate projects that have each generated over 500 million dollars online, has him in demand as an author, public speaker, board member, and business advisor.

He currently resides in Pacific Palisades, California, with his wife and son. More information about the author is available at http://www.TPatterson.NET.


© Copyright Pearson Education. All rights reserved.

Table of Contents

Acknowledgments xii
About the Author xiv
Foreword xv
The Five Ws of Mapping Security xix
The Historian and the Security Guy
1(4)
1 Charting a Course
5(94)
Why You Picked Up This Book
7(10)
Establishing Your Coordinates
17(22)
Building the Base
39(14)
Enabling Business and Enhancing Process
53(12)
Developing Radar
65(12)
Constant Vigilance
77(22)
2 Reality, Illusion, and the Souk
99(182)
Wells and the Security Guy Travel the Globe
101(10)
Europe
111(74)
Germany/Deutschland (.DE)
127(8)
France (.FR)
135(5)
The United Kingdom (.UK)
140(8)
Ireland (.IE)
148(4)
Belgium (.BE)
152(6)
Denmark
158(1)
Norway
159(1)
Sweden
160(3)
The Netherlands/Nederland (.NE)
163(4)
Switzerland/Suisse (.CH)
167(4)
Spain/Espania (.ES)
171(3)
Italy/Italia (.IT)
174(4)
Russia (.RU)
178(4)
Czech Republic (.CZ)
182(3)
The Middle East and Africa
185(26)
India (.IN)
186(6)
Dubai (.AE)
192(1)
Israel (.IL)
193(5)
Saudi Arabia (.SA)
198(3)
South Africa (.ZA)
201(10)
The Americas
211(40)
Canada (.CA)
213(5)
United States (.US)
218(16)
Mexico (.MX)
234(5)
Brazil (.BR)
239(3)
Columbia (.CO)
242(1)
Argentina (.AR)
243(4)
Chile (.CL)
247(4)
Asia Pacific
251(20)
China (.CN)
252(7)
Singapore (.SG)
259(2)
Australia (.AU)
261(4)
Japan (.JP)
265(6)
Outsourcing and Your Map
271(10)
3 Whose Law Do I Break?
281(36)
Mapping Solutions
283(2)
Mapping Law
285(8)
Mapping Technology
293(8)
Mapping Culture
301(10)
Mapping Your Future
311(6)
A: Local Security Resources by Country 317(76)
Index 393

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Excerpts

Mapping Security Preface The 5 W's of Mapping Security Why Mapping Security I have writtenMapping Securityin response to questions I have fielded from corporate executives, businessmen and -women, corporate security officers, and people seated next to me on airplanes. The queries usually fall along the same lines, as follows: How much should my company be spending on security? What do these new security and privacy rules really mean to my organization? What are my peers doing about security? Now that I have gone global, what else do I have to do? (perhaps the most frequently asked question) Importantly, I wrote this book because I have found that many of the answers to questions about security are the same around the world, and--critically--many of the answers are different, depending on where in the world your are working. This reality--linked closely to country-by-country nuances--is reinforced as you read on. Even though I have now already used the wordsecuritysix times the first two paragraphs alone, guess what.Mapping Securityis not a run-of-the-mill, technically written volume like the vast majority of its predecessors. This book does not show you how to write a security plan or write an encryption algorithm. It is really a business book that is enabled by a business understanding of what is important in managing your corporate risk. It is written for business people around the world, and it is written with today's global economy in mind. If Not Now, When? Okay, so that's the reasonwhyI wrote this book.Whenis a function of today's global economy and the risks from our increased reliance on technology. Because of supply chains, customer bases, outsourcing, and just traditional growth, more organizations than ever before are crossing borders. Therefore they are now doing business in different countries and having to change the way they look at security for the first time. Combine this global nature of business today with our great reliance on computers and communications, and we have the highest levels of threats to integral business infrastructure in history. It is time security moves to the front and center of the corporate psyche. To do that, we need a security map that spells out the realities of security, embraces all aspects of a global business, demystifies it with straight talk, and makes it accessible to entire organizations. Everyone today needs to be well armed with an understanding of the facts. Security has traditionally hidden behind esoteric discussions of cryptographic key lengths, seemingly unfathomable rules and regulations, a hacker mystique, and, often, deliberate doublespeak. Now, with technology poised to deliver the cost savings and growth needed to survive and thrive in today's global economy, it is the right time to cultivate corporate-wide understanding that leads to embracing security as the business enabler that it can be. Because companies are now working across foreign borders--and must understand foreign security rules, regulations, best practices, and the local security cultures--I have pulled together dozens of experts from different locales around the world, all of whom help to explain "their side" of the security equations you must deploy. Today iswhenwe need solutions that both protect us and enable our growth. What Makes This Book Different? ThewhatofMapping Securityis straightforward and comprises three simple parts. Part 1, "Charting a Course," will help people in any organization, anywhere in the world, reduce their risks and maximize their rewards. It outlines and illustrates six business "inside

Rewards Program