Network Security Policies and Procedures Network Security Policies and Procedures
Advances in Information Security

Network Security Policies and Procedures

    • 5.0 • 1 Rating
    • $119.99
    • $119.99

Publisher Description

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security, as well as how security policies are formulated at the executive level and communicated throughout the organization.

Network Security Policies and Procedures offers an unique mix of technical information and organizational communication concepts. Each chapter includes objectives, introduction, summary and review questions. Readers will gain a better understanding of how their colleagues on the other side of the fence view the company’s security, and will thus be better equipped to act in a way that forwards an organization's goals.

Network Security Policies and Procedures is designed for practitioners and researchers in industry. This book is also suitable for upper under graduate and graduate-level students in computer science.

GENRE
Computers & Internet
RELEASED
2007
April 6
LANGUAGE
EN
English
LENGTH
256
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
1.3
MB

More Books Like This

Security Planning and Disaster Recovery Security Planning and Disaster Recovery
2002
Security Assessment (Enhanced Edition) Security Assessment (Enhanced Edition)
2004
Security Supervision and Management Security Supervision and Management
2015
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
2022
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2012
The Information Systems Security Officer's Guide The Information Systems Security Officer's Guide
2003

Other Books in This Series

Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023