Syngress IT security project management handbook:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress
c2006
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9781597490764 http://www.sciencedirect.com/science/book/9781597490764 |
Beschreibung: | Includes index The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments |
Umfang: | 1 Online-Ressource (xxvi, 612 p.) |
ISBN: | 1597490768 9781597490764 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307666 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2006 xx o|||| 00||| eng d | ||
020 | |a 1597490768 |9 1-59749-076-8 | ||
020 | |a 9781597490764 |9 978-1-59749-076-4 | ||
035 | |a (OCoLC)70844414 | ||
035 | |a (DE-599)BVBBV042307666 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Snedaker, Susan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Syngress IT security project management handbook |c Susan Snedaker ; Russ Rogers, technical editor |
246 | 1 | 3 | |a IT security project management handbook |
264 | 1 | |a Rockland, MA |b Syngress |c c2006 | |
300 | |a 1 Online-Ressource (xxvi, 612 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments | ||
650 | 7 | |a Handbooks, manuals, etc |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security / Management |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 4 | |a Computer security |x Management |v Handbooks, manuals, etc | |
700 | 1 | |a Rogers, Russ |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490764 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027744658 | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597490764 |l DE-1046 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818979938005417984 |
---|---|
any_adam_object | |
author | Snedaker, Susan |
author_facet | Snedaker, Susan |
author_role | aut |
author_sort | Snedaker, Susan |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV042307666 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)70844414 (DE-599)BVBBV042307666 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02571nam a2200433zc 4500</leader><controlfield tag="001">BV042307666</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2006 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490768</subfield><subfield code="9">1-59749-076-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490764</subfield><subfield code="9">978-1-59749-076-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70844414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307666</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Syngress IT security project management handbook</subfield><subfield code="c">Susan Snedaker ; Russ Rogers, technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">IT security project management handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 612 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Handbooks, manuals, etc</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490764</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744658</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490764</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307666 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:07:28Z |
institution | BVB |
isbn | 1597490768 9781597490764 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744658 |
oclc_num | 70844414 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxvi, 612 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
spelling | Snedaker, Susan Verfasser aut Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor IT security project management handbook Rockland, MA Syngress c2006 1 Online-Ressource (xxvi, 612 p.) txt rdacontent c rdamedia cr rdacarrier Includes index The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments Handbooks, manuals, etc fast Computer networks / Security measures fast Computer security / Management fast Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc Rogers, Russ Sonstige oth http://www.sciencedirect.com/science/book/9781597490764 Verlag Volltext |
spellingShingle | Snedaker, Susan Syngress IT security project management handbook Handbooks, manuals, etc fast Computer networks / Security measures fast Computer security / Management fast Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc |
title | Syngress IT security project management handbook |
title_alt | IT security project management handbook |
title_auth | Syngress IT security project management handbook |
title_exact_search | Syngress IT security project management handbook |
title_full | Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_fullStr | Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_full_unstemmed | Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_short | Syngress IT security project management handbook |
title_sort | syngress it security project management handbook |
topic | Handbooks, manuals, etc fast Computer networks / Security measures fast Computer security / Management fast Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc |
topic_facet | Handbooks, manuals, etc Computer networks / Security measures Computer security / Management Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc |
url | http://www.sciencedirect.com/science/book/9781597490764 |
work_keys_str_mv | AT snedakersusan syngressitsecurityprojectmanagementhandbook AT rogersruss syngressitsecurityprojectmanagementhandbook AT snedakersusan itsecurityprojectmanagementhandbook AT rogersruss itsecurityprojectmanagementhandbook |