Home > Store

Mapping Security: The Corporate Security Sourcebook for Today's Global Economy

Register your product to gain access to bonus material or receive a coupon.

Mapping Security: The Corporate Security Sourcebook for Today's Global Economy

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

Compelling and practical view of computer security in a multinational environment--for everyone who does business in more than one country.

° Management-level must-read for companies and organizations that are (or will be) doing business in more than one country.

° As companies go global in their search for profit and growth, they need to understand how to use security as a tool for success--this book shows them how.

° Symantec Press title--the publicity power of Symantec's PR team will boost exposure and sales.

Description

  • Copyright 2005
  • Dimensions: 7" x 9-1/4"
  • Pages: 432
  • Edition: 1st
  • Book
  • ISBN-10: 0-321-30452-7
  • ISBN-13: 978-0-321-30452-0

This is a management-level book for companies and organizations that are (orwill be) doing business in more than one country. This distinction applies toincreasing numbers of corporations because remaining competitive dependsupon supply chains, customers, and outsourced operations that routinely mapacross the globe. Written in three sections, the book is designed to helpcompanies with security once they, or their extended organization, leave thecomfort of their home turf and encounter new rules, regulations, threats andcustoms. Mapping Security is woven together by the common goal of securebusiness in an entertaining and informative narrative style.

Sample Content

Online Sample Chapter

Why Corporate Security Requires Constant Vigilance

Downloadable Sample Chapter

Download the Sample Chapter related to this title.

Table of Contents

Acknowledgments.

About the Author.

Foreword.

The Five Ws of Mapping Security.

1. The Historian and the Security Guy.

I. CHARTING A COURSE.

2. Why You Picked Up This Book.

3. Establishing Your Coordinates.

4. Building the Base.

5. Enabling Business and Enhancing Process.

6. Developing Radar.

7. Constant Vigilance.

II. REALITY, ILLUSION, AND THE SOUK.

8. Wells and the Security Guy Travel the Globe.

9. Europe.

    Germany/Deutschland (.DE)

    France (.FR)

    The United Kingdom (.UK)

    Ireland (.IE)

    Belgium (.BE)

    Denmark

    Norway

    Sweden

    The Netherlands/Nederland (.NE)

    Switzerland/Suisse (.CH)

    Spain/Espania (.ES)

    Italy/Italia (.IT)

    Russia (.RU)

    Czech Republic (.CZ)

10. The Middle East and Africa.

    India (.IN)

    Dubai (.AE)

    Israel (.IL)

    Saudi Arabia (.SA)

    South Africa (.ZA)

11. The Americas.

    Canada (.CA)

    United States (.US)

    Mexico (.MX)

    Brazil (.BR)

    Columbia (.CO)

    Argentina (.AR)

    Chile (.CL)

12. Asia Pacific.

    China (.CN)

    Singapore (.SG)

    Australia (.AU)

    Japan (.JP)

13. Outsourcing and Your Map.

III. WHOSE LAW DO I BREAK?

14. Mapping Solutions.

15. Mapping Law.

16. Mapping Technology.

17. Mapping Culture.

18. Mapping Your Future.

A. Local Security Resources by Country.

Index.

Index

Download the Index file related to this title.

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership