Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
How to cheat at managing information security
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
How to cheat at managing information security/ Mark Osborne ; Paul M. Summitt, technical editor.
其他題名:
Managing information security
作者:
Osborne, Mark.
其他作者:
Summitt, Paul M.
出版者:
Rockland, MA :Syngress ;c2006.
面頁冊數:
xxv, 315 p. :ill. ;23 cm.
附註:
Includes index.
標題:
Computer security - Management. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080508283 (electronic bk.)
ISBN:
0080508286 (electronic bk.)
ISBN:
9781597491105 (paper)
ISBN:
1597491101 (paper)
How to cheat at managing information security
Osborne, Mark.
How to cheat at managing information security
[electronic resource] /Managing information securityMark Osborne ; Paul M. Summitt, technical editor. - Rockland, MA :Syngress ;c2006. - xxv, 315 p. :ill. ;23 cm.
Includes index.
The security organization -- The information security policy -- Jargon, principles, and concepts -- Information security laws and regulations -- Information security standards and audits -- Interview, bosses, and staff -- Infrastructure security -- Firewalls -- Intrusion detection systems : theory -- Intrusion detection systems : in practice -- Intrusion prevention and protection -- Network penetration testing -- Application security flaws and application testing.
This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure * A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies * Navigate through jargon filled meetings with this handy aid * Provides information on understanding the design flaws of E-commerce and DMZ infrastructure.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080508283 (electronic bk.)Subjects--Topical Terms:
154029
Computer security
--Management.Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: QA76.9.A25 / O83 2006eb
Dewey Class. No.: 005.8
How to cheat at managing information security
LDR
:03307cmm 22003134a 4500
001
1000045972
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
070802s2006 maua s 001 0 eng d
020
$a
9780080508283 (electronic bk.)
020
$a
0080508286 (electronic bk.)
020
$a
9781597491105 (paper)
020
$a
1597491101 (paper)
035
$a
(OCoLC)162131525
035
$a
ocn162131525
040
$a
OPELS
$c
OPELS
$d
OPELS
$d
OKU
$d
CUY
050
1 4
$a
QA76.9.A25
$b
O83 2006eb
082
0 4
$a
005.8
$2
22{me_controlnum}
100
1
$a
Osborne, Mark.
$3
1000060475
245
1 0
$a
How to cheat at managing information security
$h
[electronic resource] /
$c
Mark Osborne ; Paul M. Summitt, technical editor.
246
3 0
$a
Managing information security
260
$a
Rockland, MA :
$b
Syngress ;
$a
[S.l.] :
$b
Distributed by O'Reilly Media in the United States and Canada,
$c
c2006.
300
$a
xxv, 315 p. :
$b
ill. ;
$c
23 cm.
500
$a
Includes index.
505
0
$a
The security organization -- The information security policy -- Jargon, principles, and concepts -- Information security laws and regulations -- Information security standards and audits -- Interview, bosses, and staff -- Infrastructure security -- Firewalls -- Intrusion detection systems : theory -- Intrusion detection systems : in practice -- Intrusion prevention and protection -- Network penetration testing -- Application security flaws and application testing.
520
$a
This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure * A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies * Navigate through jargon filled meetings with this handy aid * Provides information on understanding the design flaws of E-commerce and DMZ infrastructure.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer security
$x
Management.
$3
154029
650
0
$a
Information technology
$x
Security measures.
$3
165715
655
7
$a
Electronic books.
$2
local.
$3
172687
700
1
$a
Summitt, Paul M.
$3
1000060476
710
2
$a
ScienceDirect (Online service)
$3
1000060142
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491105
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491105
$z
An electronic book accessible through the World Wide Web; click for information
0 筆讀者評論
館藏地:
全部
線上資料庫
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0040129
線上資料庫
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入