Surviving Security: How to Integrate People, Process, and Technology
Autor Amanda Andressen Limba Engleză Hardback – 18 dec 2003
About the Author
Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 329.12 lei 6-8 săpt. | |
CRC Press – 23 sep 2019 | 329.12 lei 6-8 săpt. | |
Hardback (1) | 680.82 lei 6-8 săpt. | |
CRC Press – 18 dec 2003 | 680.82 lei 6-8 săpt. |
Preț: 680.82 lei
Preț vechi: 987.05 lei
-31% Nou
Puncte Express: 1021
Preț estimativ în valută:
130.31€ • 135.81$ • 108.48£
130.31€ • 135.81$ • 108.48£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849320422
ISBN-10: 0849320429
Pagini: 528
Ilustrații: 56 Tables, black and white; 67 Illustrations, black and white
Dimensiuni: 156 x 234 x 33 mm
Greutate: 1.14 kg
Ediția:2nd edition
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849320429
Pagini: 528
Ilustrații: 56 Tables, black and white; 67 Illustrations, black and white
Dimensiuni: 156 x 234 x 33 mm
Greutate: 1.14 kg
Ediția:2nd edition
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Why Do I Need Security? Understanding Requirements and Risk. Security Policies and Procedures. Cryptography and Encryption. Authentication. Network Architecture and Physical Security. Firewalls and Perimeter Security. Network Management and Device Security. Wireless Network Security. Intrusion Detection. Remote Access. Host Security. Server Security. Client Security. Application Development. Security Maintenance and Monitoring. Vulnerability Testing. Security Audits. Incident Response. Integrating People, Process, and Technology. Trends to Watch.
Descriere
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.