Publication: Information Technology Security Handbook
dc.contributor.author | Sadowsky, George | |
dc.contributor.author | Dempsey, James X. | |
dc.contributor.author | Greenberg, Alan | |
dc.contributor.author | Mack, Barbara J. | |
dc.contributor.author | Schwartz, Alan | |
dc.date.accessioned | 2013-08-12T16:59:04Z | |
dc.date.available | 2013-08-12T16:59:04Z | |
dc.date.issued | 2003 | |
dc.description.abstract | Informational and Communication Technologies (ICT) plays a fundamental role for social and economic development. Similarly, it is recognized that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in helping creating the environment needed to set the ground for implementing successful national ICT plans, e-Government or e-Commerce activities, as well as sectoral projects, such as, for example, in the areas of education, health, or finance. IT security is a complex topic and evolves almost as fast as technology does. The authors provide technology-independent best practices, as well as recommendations for particular IT environments. As technology evolves, the accompanying web site (www.infodev-security.net) will provide updates as appropriate, allowing for a constant dissemination of developments in the field of IT security. The book is composed of five parts, each of which can be read independently. After an introduction to general issues of IT security, the book addresses issues relevant specifically to individuals, small and medium organizations, government, and technical administrators. Although most of the research and publications on IT security comes from developed countries, the authors have attempted to provide practical guidance applicable anywhere and to include examples from developing countries. | en |
dc.identifier | http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook | |
dc.identifier.doi | 10.1596/0-9747888-0-5 | |
dc.identifier.isbn | 0-9747888-0-5 | |
dc.identifier.uri | https://hdl.handle.net/10986/15005 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | Washington, DC: World Bank | |
dc.rights | CC BY 3.0 IGO | |
dc.rights.holder | World Bank | |
dc.rights.uri | http://creativecommons.org/licenses/by/3.0/igo | |
dc.subject | ADEQUATE SECURITY | |
dc.subject | APPLICATION SOFTWARE | |
dc.subject | ASP | |
dc.subject | BUILDING SECURITY | |
dc.subject | BUSINESS INFORMATION | |
dc.subject | COLLABORATION | |
dc.subject | COMMUNICATION TECHNOLOGIES | |
dc.subject | COMMUNICATIONS TECHNOLOGY | |
dc.subject | COMPUTER CRIME | |
dc.subject | COMPUTER NETWORKS | |
dc.subject | COMPUTER SECURITY | |
dc.subject | COMPUTER SYSTEMS | |
dc.subject | COMPUTER USERS | |
dc.subject | COMPUTERS | |
dc.subject | COPYRIGHT | |
dc.subject | COPYRIGHT PROTECTION | |
dc.subject | COUNSEL | |
dc.subject | CRIMINAL ACTIVITY | |
dc.subject | CRIMINALS | |
dc.subject | DATA SECURITY | |
dc.subject | DEVELOPED COUNTRIES | |
dc.subject | DIGITAL AGE | |
dc.subject | DIGITAL DIVIDE | |
dc.subject | DOCUMENTS | |
dc.subject | E-BUSINESS | |
dc.subject | E-COMMERCE | |
dc.subject | E-GOVERNMENT | |
dc.subject | ENCRYPTION | |
dc.subject | FRAUD | |
dc.subject | ICT | |
dc.subject | INFORMATICS | |
dc.subject | INFORMATION COMMUNICATION TECHNOLOGY | |
dc.subject | INFORMATION PROCESSING | |
dc.subject | INFORMATION SERVICES | |
dc.subject | INFORMATION SHARING | |
dc.subject | INFORMATION SYSTEMS | |
dc.subject | INFORMATION TECHNOLOGY | |
dc.subject | INNOVATION | |
dc.subject | INSTANT MESSAGING | |
dc.subject | INTERNATIONAL COMMUNITY | |
dc.subject | INTERNATIONAL COOPERATION | |
dc.subject | INTERNATIONAL TRADE | |
dc.subject | INTERNET CULTURE | |
dc.subject | INTERNET SECURITY | |
dc.subject | KNOWLEDGE CREATION | |
dc.subject | KNOWLEDGE SHARING | |
dc.subject | KNOWLEDGE TRANSFER | |
dc.subject | LEARNING | |
dc.subject | LIABILITY | |
dc.subject | LOCAL KNOWLEDGE | |
dc.subject | MEDIA | |
dc.subject | NATIONAL INFORMATION INFRASTRUCTURE | |
dc.subject | NETWORK TRAFFIC | |
dc.subject | NETWORKS | |
dc.subject | NEW PRODUCTS | |
dc.subject | ONLINE BANKING | |
dc.subject | OPPORTUNITY COSTS | |
dc.subject | OUTSOURCING | |
dc.subject | PHONES | |
dc.subject | PHYSICAL SECURITY | |
dc.subject | POLICY | |
dc.subject | POLITICAL ISSUES | |
dc.subject | POSTAL SERVICES | |
dc.subject | PRIVACY POLICIES | |
dc.subject | PRODUCTIVITY | |
dc.subject | PROGRAMS | |
dc.subject | PROTOCOLS | |
dc.subject | RISK EVALUATION | |
dc.subject | ROUTERS | |
dc.subject | SCIENCE & TECHNOLOGY | |
dc.subject | SECURITY POLICIES | |
dc.subject | SECURITY RISKS | |
dc.subject | SECURITY THREATS | |
dc.subject | SOCIAL DEVELOPMENT | |
dc.subject | TECHNICAL ASPECTS | |
dc.subject | TECHNICAL GUIDELINES | |
dc.subject | TECHNOLOGY | |
dc.subject | TECHNOLOGY DEVELOPMENT | |
dc.subject | TELECOMMUNICATIONS | |
dc.subject | TELEPHONY | |
dc.subject | TEXT | |
dc.subject | THREATS | |
dc.subject | TRAINING WORKSHOPS | |
dc.subject | UNIVERSITIES | |
dc.subject | WORLD WIDE WEB | |
dc.title | Information Technology Security Handbook | en |
dspace.entity.type | Publication | |
okr.date.doiregistration | 2025-04-15T11:54:55.383612Z | |
okr.doctype | Publications & Research::Publication | |
okr.doctype | Publications & Research::Publication | |
okr.docurl | http://documents.worldbank.org/curated/en/2003/01/5155128/information-technology-security-handbook | |
okr.globalpractice | Macroeconomics and Fiscal Management | |
okr.globalpractice | Education | |
okr.globalpractice | Transport and ICT | |
okr.guid | 848811468779079079 | |
okr.identifier.externaldocumentum | 000160016_20040930112655 | |
okr.identifier.internaldocumentum | 5155128 | |
okr.identifier.report | 30075 | |
okr.language.supported | en | |
okr.pdfurl | http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2004/09/30/000160016_20040930112655/Rendered/PDF/300750PAPER0eSecurity.pdf | en |
okr.peerreview | Academic Peer Review | |
okr.topic | Macroeconomics and Economic Growth::Knowledge Economy | |
okr.topic | Education::Education for the Knowledge Economy | |
okr.topic | International Terrorism and Counterterrorism | |
okr.topic | Information and Communication Technologies::ICT Policy and Strategies | |
okr.topic | General Technology | |
okr.unit | Office of the Sr. Vice President (EXTVP) | |
okr.volume | 1 of 1 |
Files
License bundle
1 - 1 of 1