Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book is written for the first security hire in an organization; either an individual moving into this role from within the organization or hired into the role.
This book is written for the first security hire in an organization; either an individual moving into this role from within the organization or hired into the role.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Walter Williams has served as an infrastructure and security architect at firms as diverse as GTE Internetworking, State Street Corp, Teradyne, The Commerce Group and EMC. He has since moved to security leadership, where he'd served as at IdentityTruth, Passkey, Lattice Engines, and Monotype. He is an outspoken proponent of design before build, an advocate of frameworks and standards, and has spoken at Security B-Sides, Source Boston, Boston Application Security Conference, Rochester Security Summit, Wall of Sheep Village within DefCon, RiskSec Toronto and other venues . His articles on Security and Service Oriented Architecture have appeared in the Information Security Management Handbook, and he has a book with CRC press on the same topic. He sat on the board of directors for the New England ISSA chapter and was a member of the program committee for Metricons 8 and 10. He has a masters degree in Anthropology from Hunter College.
Inhaltsangabe
Preface. Chapter 1 Getting Started. Chapter 2 The Things You Must Do. Chapter 3 Asset Management. Chapter 4 Vulnerability Management. Chapter 5 Incident Management. Chapter 6 The Endpoint. Chapter 7 Email Security. Chapter 8 The Network. Chapter 9 Integrating Security Into Software Development. Chapter 10 Disasters. Chapter 11 Access Control. Chapter 12 Human Issues. Chapter 13 Maturity. Index.
Preface. Chapter 1 Getting Started. Chapter 2 The Things You Must Do. Chapter 3 Asset Management. Chapter 4 Vulnerability Management. Chapter 5 Incident Management. Chapter 6 The Endpoint. Chapter 7 Email Security. Chapter 8 The Network. Chapter 9 Integrating Security Into Software Development. Chapter 10 Disasters. Chapter 11 Access Control. Chapter 12 Human Issues. Chapter 13 Maturity. Index.