Home > Store > Security > Network Security

Mapping Security: The Corporate Security Sourcebook for Today's Global Economy

Register your product to gain access to bonus material or receive a coupon.

Mapping Security: The Corporate Security Sourcebook for Today's Global Economy

Book

  • Your Price: $35.99
  • List Price: $44.99
  • Usually ships in 24 hours.

About

Features

Compelling and practical view of computer security in a multinational environment--for everyone who does business in more than one country.

° Management-level must-read for companies and organizations that are (or will be) doing business in more than one country.

° As companies go global in their search for profit and growth, they need to understand how to use security as a tool for success--this book shows them how.

° Symantec Press title--the publicity power of Symantec's PR team will boost exposure and sales.

Description

  • Copyright 2005
  • Dimensions: 7x9-1/4
  • Pages: 432
  • Edition: 1st
  • Book
  • ISBN-10: 0-321-30452-7
  • ISBN-13: 978-0-321-30452-0

Praise for Tom Patterson's Mapping Security

"Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!"

—Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP)

"The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson has more than a decade of first-hand experience in defending against such risks and it shows. He uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to businesspeople around the globe."

—Chris Anderson, Editor in Chief, Wired Magazine

Whether consumers or global giants, we all need to be spending a greater share of our budgets on security. The threats are greater than ever and increasing daily, and yet there is a challenge as to how to justify the expenditure. Mapping Security offers business-oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency.

—John R Patrick, president of Attitude LLC and former vice president of Internet Technology at IBM Corporation

As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how.

—Dr. Craig Fields, former director of Advanced Research Projects Agency (ARPA) for the U.S. Government

The Definitive Guide to Effective Security in Complex Global Markets

Companies are global today and have complex security supply chains, out-sourced operations, and customer relationships that span the world. Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business.

Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritative briefing on today's global security realities. Using real-world examples, he shows how to change your approach to security as you move more deeply into global markets: how to resolve contradictions among the complex rules and customs you'll have to follow and how to customize security solutions for every market. Along the way, he introduces the Mapping Security Index (MSI), a powerful new metric for rapidly quantifying security risk associated with 30 key markets. Coverage includes

  • How technology, mass globalization, and stricter accountability are forcing security to the core of the enterprise

  • Six proven keys to defining and implementing global security strategies that work within today's budget realities

  • Detailed country-by-country drill downs on security in Europe, the Middle East and Africa, the Americas, and the Asia-Pacific region

  • Practical advice on what to do when laws collide

  • Quantifying the security posture and associated risks of potential cross-border partners

  • "On-the-ground" help: Indispensable local security resources

Visit www.MappingSecurity.com for Tom Patterson's latest updates and analysis, including the latest changes to the MSI country scores, and to participate in the Mapping Security Reader Forum.


© Copyright Pearson Education. All rights reserved.

Sample Content

Online Sample Chapter

Why Corporate Security Requires Constant Vigilance

Downloadable Sample Chapter

Download the Sample Chapter related to this title.

Table of Contents

Acknowledgments.

About the Author.

Foreword.

The Five Ws of Mapping Security.

1. The Historian and the Security Guy.

I. CHARTING A COURSE.

2. Why You Picked Up This Book.

3. Establishing Your Coordinates.

4. Building the Base.

5. Enabling Business and Enhancing Process.

6. Developing Radar.

7. Constant Vigilance.

II. REALITY, ILLUSION, AND THE SOUK.

8. Wells and the Security Guy Travel the Globe.

9. Europe.

    Germany/Deutschland (.DE)

    France (.FR)

    The United Kingdom (.UK)

    Ireland (.IE)

    Belgium (.BE)

    Denmark

    Norway

    Sweden

    The Netherlands/Nederland (.NE)

    Switzerland/Suisse (.CH)

    Spain/Espania (.ES)

    Italy/Italia (.IT)

    Russia (.RU)

    Czech Republic (.CZ)

10. The Middle East and Africa.

    India (.IN)

    Dubai (.AE)

    Israel (.IL)

    Saudi Arabia (.SA)

    South Africa (.ZA)

11. The Americas.

    Canada (.CA)

    United States (.US)

    Mexico (.MX)

    Brazil (.BR)

    Columbia (.CO)

    Argentina (.AR)

    Chile (.CL)

12. Asia Pacific.

    China (.CN)

    Singapore (.SG)

    Australia (.AU)

    Japan (.JP)

13. Outsourcing and Your Map.

III. WHOSE LAW DO I BREAK?

14. Mapping Solutions.

15. Mapping Law.

16. Mapping Technology.

17. Mapping Culture.

18. Mapping Your Future.

A. Local Security Resources by Country.

Index.

Index

Download the Index file related to this title.

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership