Managing information security
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerabilit...
Saved in:
| Other Authors: | Vacca, John R |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
2014
|
| Edition: | 2nd ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Computer and information security handbook
Published: (2009)
Published: (2009)
Computer and information security handbook
Published: (2013)
Published: (2013)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Advanced penetration testing hacking the world's most secure networks
by: Allsopp, Wil
Published: (2017)
by: Allsopp, Wil
Published: (2017)
Learning Kali Linux security testing, penetration testing, and ethical hacking
by: Messier, Ric
Published: (2018)
by: Messier, Ric
Published: (2018)
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Hands-on ethical hacking and network defense
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
Hacking with kali practical penetration testing techniques
by: Broad, James
Published: (2014)
by: Broad, James
Published: (2014)
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
Software test attacks to break mobile and embedded devices
by: Hagar, Jon Duncan
Published: (2017)
by: Hagar, Jon Duncan
Published: (2017)
Learn ethical hacking from scratch your stepping stone to penetration testing
by: Sabih, Zaid
Published: (2018)
by: Sabih, Zaid
Published: (2018)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer and information security
Published: (2016)
Published: (2016)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Security t guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Computer security handbook
Published: (2014)
Published: (2014)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Information protection playbook
Published: (2013)
Published: (2013)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997)
by: Bruce
Published: (1997)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Certified ethical hacker (CEH) version 9 cert guide
by: Gregg, Michael
Published: (2017)
by: Gregg, Michael
Published: (2017)
Principles of information systems security text and cases
by: Dhillon 1963-
Published: (2007)
by: Dhillon 1963-
Published: (2007)
Similar Items
-
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015) -
Computer and information security handbook
Published: (2009) -
Computer and information security handbook
Published: (2013) -
Corporate computer and network security
by: Panko lhRaymond R -
Advanced penetration testing hacking the world's most secure networks
by: Allsopp, Wil
Published: (2017)


