Syngress IT security project management handbook

The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Ac...

Πλήρης περιγραφή

Κύριος συγγραφέας: Snedaker, Susan.
Άλλοι συγγραφείς: Rogers, Russ.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Rockland, MA : Syngress, c2006.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597490764
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 02528cam a2200301 a 4500
001 1/45319
008 140822s2006 us 001 0 eng
020 |a 9781597490764 
020 |a 1597490768 
035 |l 48279 
040 |a OPELS  |b eng  |c OPELS  |d OPELS  |d OCLCQ  |d OCLCF  |d GR-PeUP 
100 1 |a Snedaker, Susan. 
245 1 0 |a Syngress IT security project management handbook  |h [electronic resource] /  |c Susan Snedaker ; Russ Rogers, technical editor. 
246 3 0 |a IT security project management handbook 
260 |a Rockland, MA :  |b Syngress,  |c c2006. 
300 |a 1 online resource (xxvi, 612 p.) :  |b ill. 
520 |a The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. 
505 0 |a Identifying Objectives of IT Security Projects -- Taking Inventory of Cores Assets -- Identifying and Prioritizing Threats -- Existing Security Infrastructure -- Creating Penetrations Tests -- Analyzing Security Logs -- Creating Successful IDS -- Monitoring Host Servers -- Managing Internal Threats -- Contingency Planning and Disaster Recovery. 
500 |a Includes index. 
650 4 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc. 
650 4 |a Computer security  |x Management  |x Handbooks, manuals, etc. 
655 4 |a Electronic books. 
655 4 |a Handbooks, manuals, etc. 
700 1 |a Rogers, Russ. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140825  |p 00b48279  |q 00b48279  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781597490764 
856 4 |d /webopac/covers/03/48279_9781597490764.jpg 
856 4 |d /webopac/covers/03/48279_1597490768.jpg