How to Cheat at Managing Information Security: How to Cheat
Autor Mark Osborneen Limba Engleză Paperback – 21 aug 2006
These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.
Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure
* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies
* Navigate through jargon filled meetings with this handy aid
* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure
Preț: 294.53 lei
Preț vechi: 368.15 lei
-20% Nou
Puncte Express: 442
Preț estimativ în valută:
52.12€ • 61.11$ • 45.77£
52.12€ • 61.11$ • 45.77£
Carte tipărită la comandă
Livrare economică 30 ianuarie-13 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597491105
ISBN-10: 1597491101
Pagini: 352
Ilustrații: 1, black & white illustrations
Dimensiuni: 152 x 229 x 20 mm
Greutate: 0.49 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat
ISBN-10: 1597491101
Pagini: 352
Ilustrații: 1, black & white illustrations
Dimensiuni: 152 x 229 x 20 mm
Greutate: 0.49 kg
Editura: ELSEVIER SCIENCE
Seria How to Cheat
Public țintă
For managers responsible for IT/Security departments from small office environments up to enterprise networks.Cuprins
Chapter 1: Preface and Introduction Chapter 2: The Security Organization Chapter 3: The Information Security Policy Chapter 4: Jargon, principles and concepts Chapter 5: Information Security laws and regulations Chapter 6: Information Security Standards and Audits Chapter 7: Interviews, Bosses and Staff Chapter 8: Infrastructure security Chapter 9: Firewalls Chapter 10: Intruder detection systems – Theory Chapter 11: Intruder detection systems – In Practice Chapter 12: Intruder Prevention and Protection Chapter13: Network penetration testing Chapter14: Application security flaws and application testing