Network Security Policies and Procedures Network Security Policies and Procedures
Advances in Information Security

Network Security Policies and Procedures

    • ٥٫٠ - ١ تقييم
    • ‏119٫99 US$
    • ‏119٫99 US$

وصف الناشر

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security, as well as how security policies are formulated at the executive level and communicated throughout the organization.

Network Security Policies and Procedures offers an unique mix of technical information and organizational communication concepts. Each chapter includes objectives, introduction, summary and review questions. Readers will gain a better understanding of how their colleagues on the other side of the fence view the company’s security, and will thus be better equipped to act in a way that forwards an organization's goals.

Network Security Policies and Procedures is designed for practitioners and researchers in industry. This book is also suitable for upper under graduate and graduate-level students in computer science.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٧
٦ أبريل
اللغة
EN
الإنجليزية
عدد الصفحات
٢٥٦
الناشر
Springer US
البائع
Springer Nature B.V.
الحجم
١٫٣
‫م.ب.‬
Security Planning and Disaster Recovery Security Planning and Disaster Recovery
٢٠٠٢
Security Assessment (Enhanced Edition) Security Assessment (Enhanced Edition)
٢٠٠٤
Security Supervision and Management Security Supervision and Management
٢٠١٥
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
٢٠٢٢
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
٢٠١٢
The Information Systems Security Officer's Guide (Enhanced Edition) The Information Systems Security Officer's Guide (Enhanced Edition)
٢٠٠٣
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks Security for Telecommunications Networks
٢٠٠٨
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
٢٠٠٧
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
٢٠١٥
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
٢٠٢٣