51,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
26 °P sammeln
  • Broschiertes Buch

The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes; impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus,…mehr

Produktbeschreibung
The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes; impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus, new social and technical security controls are imperative in this revolution. This book therefore provides means for evaluation, formation and implementation of ICT security controls. The Social- Technical ICT Security Readiness Checklist can be helpful in managing the risks that ICT presents. Also the challenges of the process of computerisation and other changes due to ICT are investigatedin the book from a security point of view.The checklist would serve as a starting point in assisting organizations to meet the security challenges of exploiting the benefits of ICT.
Autorenporträt
Charles received his Ph.D. and Ph.L. degrees in Computer and Systems Sciences from Stockholm University in 2006 and 2003 respectively; and his BSc Eng. from the University of Dar es Salaam in 1994. He works at the University of Dar es Salaam and is involved in Research, Consultancy and Teaching related to Computer and Networks Security.