Syngress IT security project management handbook
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Ac...
Κύριος συγγραφέας: | Snedaker, Susan. |
---|---|
Άλλοι συγγραφείς: | Rogers, Russ. |
Μορφή: | Ηλεκτρονική πηγή |
Γλώσσα: | English |
Στοιχεία έκδοσης: |
Rockland, MA :
Syngress,
c2006.
|
Θέματα: | |
Διαθέσιμο Online: |
http://www.sciencedirect.com/science/book/9781597490764 |
Ετικέτες: |
Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
|
LEADER | 02528cam a2200301 a 4500 | ||
---|---|---|---|
001 | 1/45319 | ||
008 | 140822s2006 us 001 0 eng | ||
020 | |a 9781597490764 | ||
020 | |a 1597490768 | ||
035 | |l 48279 | ||
040 | |a OPELS |b eng |c OPELS |d OPELS |d OCLCQ |d OCLCF |d GR-PeUP | ||
100 | 1 | |a Snedaker, Susan. | |
245 | 1 | 0 | |a Syngress IT security project management handbook |h [electronic resource] / |c Susan Snedaker ; Russ Rogers, technical editor. |
246 | 3 | 0 | |a IT security project management handbook |
260 | |a Rockland, MA : |b Syngress, |c c2006. | ||
300 | |a 1 online resource (xxvi, 612 p.) : |b ill. | ||
520 | |a The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. | ||
505 | 0 | |a Identifying Objectives of IT Security Projects -- Taking Inventory of Cores Assets -- Identifying and Prioritizing Threats -- Existing Security Infrastructure -- Creating Penetrations Tests -- Analyzing Security Logs -- Creating Successful IDS -- Monitoring Host Servers -- Managing Internal Threats -- Contingency Planning and Disaster Recovery. | |
500 | |a Includes index. | ||
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc. | |
650 | 4 | |a Computer security |x Management |x Handbooks, manuals, etc. | |
655 | 4 | |a Electronic books. | |
655 | 4 | |a Handbooks, manuals, etc. | |
700 | 1 | |a Rogers, Russ. | |
852 | |a INST |b UNIPILB |c EBOOKS |e 20140825 |p 00b48279 |q 00b48279 |t ONLINE |y 0 | ||
856 | 4 | 0 | |3 ScienceDirect |u http://www.sciencedirect.com/science/book/9781597490764 |
856 | 4 | |d /webopac/covers/03/48279_9781597490764.jpg | |
856 | 4 | |d /webopac/covers/03/48279_1597490768.jpg |