Network Security Policies and Procedures Network Security Policies and Procedures
Advances in Information Security

Network Security Policies and Procedures

    • $159.99
    • $159.99

Publisher Description

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security, as well as how security policies are formulated at the executive level and communicated throughout the organization.

Network Security Policies and Procedures offers an unique mix of technical information and organizational communication concepts. Each chapter includes objectives, introduction, summary and review questions. Readers will gain a better understanding of how their colleagues on the other side of the fence view the company’s security, and will thus be better equipped to act in a way that forwards an organization's goals.

Network Security Policies and Procedures is designed for practitioners and researchers in industry. This book is also suitable for upper under graduate and graduate-level students in computer science.

GENRE
Computing & Internet
RELEASED
2007
6 April
LANGUAGE
EN
English
LENGTH
256
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
1.3
MB
Security Planning and Disaster Recovery Security Planning and Disaster Recovery
2002
Security Assessment (Enhanced Edition) Security Assessment (Enhanced Edition)
2004
Security Supervision and Management Security Supervision and Management
2015
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
2022
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2012
The Information Systems Security Officer's Guide (Enhanced Edition) The Information Systems Security Officer's Guide (Enhanced Edition)
2003
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
2020
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Evolution of Cyber Technologies and Operations to 2035 Evolution of Cyber Technologies and Operations to 2035
2015
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024