eBooks-it.org Logo
eBooks-IT.org Inner Image

Managing Information Security

2nd Edition
Managing Information Security Image

Book Details:

Publisher:Syngress
Series: Springer
Author:John R. Vacca
Edition:2
ISBN-10:0124166881
ISBN-13:9780124166882
Pages:372
Published:Sep 23 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:13.55 MB

Book Description:

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere elseComprehensive coverage by leading experts allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions

Download Link:

Related Books:

Information Security Auditor

Careers in Information Security
Information Security Auditor Image
The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression as well as tools, standards and frameworks related to the role. It gives practical guidance to those new to the role or interested in developing a better understanding of what it entails....

Managing Information Technology Projects

Applying Project Management Strategies to Software, Hardware, and Integration Initiatives
Managing Information Technology Projects Image
"With software and hardware development techniques improving constantly, it's surprising to learn that more than half of all technology projects overrun their schedules and budgets by 200 percent or more. "Computerworld" magazine recently reported several surveys showing that project failure is overwhelmingly traceable to poorly defined project organization, a lack of training, weak executive support, inconsistent methods and policies, and other readily addressed factors. "Managing Information Technology Projects" gives systems project managers field-proven tools and step-by-step methodologies to start and complete every project - hardware, software, or integration - within prescribed parameters. This title includes topics su...

Security Risk Management

Building an Information Security Risk Management Program from the Ground Up
Security Risk Management Image
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods...



2007 - 2021 © eBooks-IT.org