Managing information security
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerabilit...
Saved in:
| Other Authors: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
2014
|
| Edition: | 2nd ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Information security essentials for IT managers / Albert Caballero
- Security manangement systems / James T. Harmening
- information technology security management / Rahul Bhaskar and Bhushan Kapoor
- Online identity and user management services / Tewfiq El Maliki and Jean-Marc Seigneur
- Intrusion prevention and detection systems / Christopher Day
- Firewalls / Dr. Errin W. Fulp
- Penetration testing / Sanjay Bavisi
- What is vulnerability assessment? / Almantas Kakareka
- Cyber forensics / Scott R. Ellis
- Cyber forensics and incident response / Cem Gurkok
- Nerwork forensics / Yong Guan.


