Security Smarts for the Self-Guided IT Professional Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide , Third Edition is fully updated to include thelatest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption technologies…mehr
Security Smarts for the Self-Guided IT Professional Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide , Third Edition is fully updated to include thelatest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption technologies arediscussed in detail. The book explains how to create and deploy an effective security policy, manage and assess risk, and perform audits. Information security best practices and standards, including ISO/IEC 27002, arecovered in this practical resource. Network Security: A Beginner's Guide , ThirdEdition features: Lingo --Common security terms defined so that you're in the know on the job IMHO --Frank and relevant opinions based on theauthor's years of industry experience Budget Note --Tips for getting security technologies and processes into your organization's budget In Actual Practice --Exceptions to the rules of security explained in real-world contexts Your Plan --Customizable checklists you can use on the job now Into Action --Tips on how, why, and when to applynew skills and techniques at workHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Eric Maiwald is a Research Vice President with Gartner, Inc. where he focuses on enterprise security infrastructure and mobility technologies. Mr. Maiwald has over twenty years of experience in information security where has worked as a security officer and consultant for large financial institutions, healthcare providers, services firms, and manufacturers. He has extensive experience in the security field performing assessments, policy development, architecture design, and product implementations. Mr. Maiwald holds a Bachelors of Science in Electrical Engineering degree from Rensselaer Polytechnic Institute and a Masters of Engineering in Electrical Engineering from Stevens Institute of Technology and is a Certified Information Systems Security Professional. He is a named inventor on patent numbers 5,577,209, "Apparatus and Method for Providing Multi-level Security for Communications among Computers and Terminals on a Network," 5,872,847, "Using Trusted Associations to Establish Trust in a Computer Network," 5,940,591 "Apparatus and Method for Providing Network Security," and 6,212,636 "Method for Establishing Trust in a Computer Network via Association." Mr. Maiwald is a regular presenter at a number of well-known security conferences. He has also written Security Planning and Disaster Recovery (with William Sieglein), and Fundamentals of Network Security, both published by Osborne/McGraw-Hill and is a contributing author for Hacking Linux Exposed, and Hacker's Challenge also published by Osborne/McGraw-Hill.
Inhaltsangabe
Part I: Informaiton Security Basics 1What is Information Security? 2Types of Attacks 3Hacker Techniques 4Information Security Services Part II: Ground Work 5Policy 6Managing Risk 7Information Security Process 8Information Security Best Practices & Drivers Part III: Network Security Technology 9Perimeter Technology 10Monitoring Technology 11Encryption Technology
Part I: Informaiton Security Basics 1What is Information Security? 2Types of Attacks 3Hacker Techniques 4Information Security Services Part II: Ground Work 5Policy 6Managing Risk 7Information Security Process 8Information Security Best Practices & Drivers Part III: Network Security Technology 9Perimeter Technology 10Monitoring Technology 11Encryption Technology
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497