Presents IT security status using managerial measures of performance such as balanced scorecardsShows how the security of IT relates to risk business analysisDemonstrates how to align the practices of each facet of business so they work together using the same strategiesDescribes how the facets of a secure IT system are related to the security of suppliers and customers
... readers of the book, have a great chance to learn professional structures and program designs ... . This book can be recommended for researchers and university students in information security systems. Also, engineers, security system designers, and developers will find in it interesting and useful ... . -Nicholas Sklavos, in Greece IEEE, April 2011, Vol. 2, No. 2