Network Security Policies and Procedures Network Security Policies and Procedures
Advances in Information Security

Network Security Policies and Procedures

    • 5.0 • 1개의 평가
    • US$119.99
    • US$119.99

출판사 설명

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security, as well as how security policies are formulated at the executive level and communicated throughout the organization.

Network Security Policies and Procedures offers an unique mix of technical information and organizational communication concepts. Each chapter includes objectives, introduction, summary and review questions. Readers will gain a better understanding of how their colleagues on the other side of the fence view the company’s security, and will thus be better equipped to act in a way that forwards an organization's goals.

Network Security Policies and Procedures is designed for practitioners and researchers in industry. This book is also suitable for upper under graduate and graduate-level students in computer science.

장르
컴퓨터 및 인터넷
출시일
2007년
4월 6일
언어
EN
영어
길이
256
페이지
출판사
Springer US
판매자
Springer Nature B.V.
크기
1.3
MB
Security Planning and Disaster Recovery Security Planning and Disaster Recovery
2002년
Security Assessment (Enhanced Edition) Security Assessment (Enhanced Edition)
2004년
Security Supervision and Management Security Supervision and Management
2015년
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
2022년
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2012년
The Information Systems Security Officer's Guide (Enhanced Edition) The Information Systems Security Officer's Guide (Enhanced Edition)
2003년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023년