Register your product to gain access to bonus material or receive a coupon.
Compelling and practical view of computer security in a multinational environment--for everyone who does business in more than one country.
° Management-level must-read for companies and organizations that are (or will be) doing business in more than one country.
° As companies go global in their search for profit and growth, they need to understand how to use security as a tool for success--this book shows them how.
° Symantec Press title--the publicity power of Symantec's PR team will boost exposure and sales.
This is a management-level book for companies and organizations that are (orwill be) doing business in more than one country. This distinction applies toincreasing numbers of corporations because remaining competitive dependsupon supply chains, customers, and outsourced operations that routinely mapacross the globe. Written in three sections, the book is designed to helpcompanies with security once they, or their extended organization, leave thecomfort of their home turf and encounter new rules, regulations, threats andcustoms. Mapping Security is woven together by the common goal of securebusiness in an entertaining and informative narrative style.
Business Resumption Planning in Small and Medium-Sized Offices
How Much Security Is Too Much?
Legal Requirements for Disaster Recovery Planning: Common Facts and Misconceptions
That Special Souvenir from Paris: The French Give Up Packing Explosives with Passengers
Why Corporate Security Requires Constant Vigilance
Download the Sample
Chapter related to this title.
Acknowledgments.
About the Author.
Foreword.
The Five Ws of Mapping Security.
1. The Historian and the Security Guy.
I. CHARTING A COURSE.
2. Why You Picked Up This Book.
3. Establishing Your Coordinates.
4. Building the Base.
5. Enabling Business and Enhancing Process.
6. Developing Radar.
7. Constant Vigilance.
II. REALITY, ILLUSION, AND THE SOUK.
8. Wells and the Security Guy Travel the Globe.
9. Europe.
Germany/Deutschland (.DE)
France (.FR)
The United Kingdom (.UK)
Ireland (.IE)
Belgium (.BE)
Denmark
Norway
Sweden
The Netherlands/Nederland (.NE)
Switzerland/Suisse (.CH)
Spain/Espania (.ES)
Italy/Italia (.IT)
Russia (.RU)
Czech Republic (.CZ)
10. The Middle East and Africa.
India (.IN)
Dubai (.AE)
Israel (.IL)
Saudi Arabia (.SA)
South Africa (.ZA)
11. The Americas.
Canada (.CA)
United States (.US)
Mexico (.MX)
Brazil (.BR)
Columbia (.CO)
Argentina (.AR)
Chile (.CL)
12. Asia Pacific.
China (.CN)
Singapore (.SG)
Australia (.AU)
Japan (.JP)
13. Outsourcing and Your Map.
III. WHOSE LAW DO I BREAK?
14. Mapping Solutions.
15. Mapping Law.
16. Mapping Technology.
17. Mapping Culture.
18. Mapping Your Future.
A. Local Security Resources by Country.
Index.
Download the Index
file related to this title.