Cargando…

How to cheat at managing information security /

This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, bu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Osborne, Mark
Otros Autores: Summitt, Paul M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2006.
Colección:"How to cheat--"
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocm71011335
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 060822s2006 mau o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d TUU  |d OCLCQ  |d B24X7  |d OPELS  |d OKU  |d CUY  |d DEBBG  |d CUZ  |d CPE  |d BMU  |d QE2  |d E7B  |d IDEBK  |d NRU  |d UMI  |d CEF  |d ZCU  |d DKDLA  |d DEBSZ  |d ALAUL  |d FVL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d NLGGC  |d OCLCQ  |d OCLCO  |d AU@  |d OCLCO  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d CNNLC  |d OCLCO  |d LOA  |d AGLDB  |d COCUF  |d CNNOR  |d CCO  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d JBG  |d WY@  |d U3W  |d OCLCA  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d VTS  |d NRAMU  |d MOQ  |d NLE  |d INT  |d VT2  |d OCLCQ  |d UKMGB  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d LEAUB  |d M8D  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ  |d QGK  |d OCLCO 
015 |a GBB738671  |2 bnb 
016 7 |a 017548661  |2 Uk 
019 |a 162131525  |a 181421150  |a 319430091  |a 320315074  |a 473843257  |a 482013995  |a 507230072  |a 560282042  |a 722510432  |a 728025422  |a 781253146  |a 823830571  |a 823900278  |a 824091552  |a 824139771  |a 856959620  |a 888620241  |a 961662393  |a 962572563  |a 1037432934  |a 1044619466  |a 1259149964 
020 |a 1423796527  |q (electronic bk.) 
020 |a 9781423796527  |q (electronic bk.) 
020 |a 9781597491105 
020 |a 1597491101 
020 |a 0080508286  |q (ebook) 
020 |a 9780080508283  |q (ebook) 
020 |a 1281072974 
020 |a 9781281072979 
020 |a 9786611072971 
020 |a 6611072977 
020 |a 1597491314 
020 |a 9781597491310 
024 1 |a 792502911013 
024 3 |a 9781597491105 
029 1 |a AU@  |b 000044593576 
029 1 |a AU@  |b 000048781345 
029 1 |a AU@  |b 000051860388 
029 1 |a AU@  |b 000053238868 
029 1 |a CHBIS  |b 005829753 
029 1 |a CHNEW  |b 001004909 
029 1 |a CHVBK  |b 168531194 
029 1 |a DEBBG  |b BV023293879 
029 1 |a DEBBG  |b BV042307413 
029 1 |a DEBBG  |b BV043106878 
029 1 |a DEBSZ  |b 355443414 
029 1 |a DEBSZ  |b 405305753 
029 1 |a DEBSZ  |b 422264911 
029 1 |a DEBSZ  |b 430344279 
029 1 |a HEBIS  |b 291513727 
029 1 |a NZ1  |b 12047471 
029 1 |a NZ1  |b 15177216 
029 1 |a UKMGB  |b 017548661 
029 1 |a UNITY  |b 140150420 
029 1 |a YDXCP  |b 2467988 
035 |a (OCoLC)71011335  |z (OCoLC)162131525  |z (OCoLC)181421150  |z (OCoLC)319430091  |z (OCoLC)320315074  |z (OCoLC)473843257  |z (OCoLC)482013995  |z (OCoLC)507230072  |z (OCoLC)560282042  |z (OCoLC)722510432  |z (OCoLC)728025422  |z (OCoLC)781253146  |z (OCoLC)823830571  |z (OCoLC)823900278  |z (OCoLC)824091552  |z (OCoLC)824139771  |z (OCoLC)856959620  |z (OCoLC)888620241  |z (OCoLC)961662393  |z (OCoLC)962572563  |z (OCoLC)1037432934  |z (OCoLC)1044619466  |z (OCoLC)1259149964 
037 |a 136078:136211  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b O83 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UACD  |2 bicssc 
082 0 4 |a 005.8/068  |2 22 
049 |a UAMI 
100 1 |a Osborne, Mark. 
245 1 0 |a How to cheat at managing information security /  |c Mark Osborne ; Paul M. Summitt, technical editor. 
246 3 0 |a Managing information security 
260 |a Rockland, MA :  |b Syngress,  |c ©2006. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a How to Cheat Series 
505 0 |a The security organization -- The information security policy -- Jargon, principles, and concepts -- Information security laws and regulations -- Information security standards and audits -- Interview, bosses, and staff -- Infrastructure security -- Firewalls -- Intrusion detection systems : theory -- Intrusion detection systems : in practice -- Intrusion prevention and protection -- Network penetration testing -- Application security flaws and application testing. 
520 |a This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure * A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies * Navigate through jargon filled meetings with this handy aid * Provides information on understanding the design flaws of E-commerce and DMZ infrastructure. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Management. 
650 0 |a Information technology  |x Security measures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Summitt, Paul M. 
776 0 8 |i Print version:  |a Osborne, Mark.  |t How to cheat at managing information security.  |d Rockland, MA : Syngress ; [S.l.] : Distributed by O'Reilly Media in the United States and Canada, ©2006  |z 1597491101  |z 9781597491105  |w (OCoLC)71261147 
830 0 |a "How to cheat--" 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=165096  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597491105/?ar  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00014603 
938 |a ebrary  |b EBRY  |n ebr10142561 
938 |a EBSCOhost  |b EBSC  |n 165096 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 107297 
938 |a YBP Library Services  |b YANK  |n 2467988 
938 |a YBP Library Services  |b YANK  |n 2730655 
938 |a YBP Library Services  |b YANK  |n 2627196 
994 |a 92  |b IZTAP