Mission-critical Security Planner
Mission-critical Security Planner
When Hackers Won't Take No for an Answer
Greenberg, Eric
John Wiley and Sons Ltd
01/2003
432
Mole
Inglês
9780471211655
0471211656
15 a 20 dias
654
Computer security is fast becoming the top concern of every Fortune 1000 company. Eric Greenberg walks the reader through a detailed, individualized needs analysis, technology choices, and cost implications using a witty and lively writing style, supported by solid business planning methods.
Introduction. Chapter 1. Setting the Stage for Successful Security Planning. Chapter 2. A Security Plan That Works. Chapter 3. Using the Security Plan Worksheets: The Fundamentals. Chapter 4. Using the Security Plan Worksheets: The Remaining Core and Wrap-up Elements. Chapter 5. Strategic Security Planning with PKI. Chapter 6. Ahead of the Hacker: Best Practices and a View of the Future. For Further Reading. Glossary. Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Computer security is fast becoming the top concern of every Fortune 1000 company. Eric Greenberg walks the reader through a detailed, individualized needs analysis, technology choices, and cost implications using a witty and lively writing style, supported by solid business planning methods.
Introduction. Chapter 1. Setting the Stage for Successful Security Planning. Chapter 2. A Security Plan That Works. Chapter 3. Using the Security Plan Worksheets: The Fundamentals. Chapter 4. Using the Security Plan Worksheets: The Remaining Core and Wrap-up Elements. Chapter 5. Strategic Security Planning with PKI. Chapter 6. Ahead of the Hacker: Best Practices and a View of the Future. For Further Reading. Glossary. Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.