Managing information security:
This book offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and mo...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
2014
|
Ausgabe: | 2nd edition |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780124166882/?ar |
Zusammenfassung: | This book offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxiv, 347 Seiten) |
ISBN: | 9780124166943 0124166946 9780124166882 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047404825 | ||
003 | DE-627-1 | ||
005 | 20240228115355.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9780124166943 |c electronic bk. |9 978-0-12-416694-3 | ||
020 | |a 0124166946 |c electronic bk. |9 0-12-416694-6 | ||
020 | |a 9780124166882 |9 978-0-12-416688-2 | ||
035 | |a (DE-627-1)047404825 | ||
035 | |a (DE-599)KEP047404825 | ||
035 | |a (ORHE)9780124166882 | ||
035 | |a (DE-627-1)047404825 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Managing information security |c edited by John R. Vacca |
250 | |a 2nd edition | ||
264 | 1 | |a Waltham, MA |b Syngress |c 2014 | |
300 | |a 1 Online-Ressource (xxiv, 347 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a This book offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. | ||
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Electronic data processing departments |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Centres de traitement de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Electronic data processing departments ; Security measures | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Livres électroniques | |
700 | 1 | |a Vacca, John R. |e HerausgeberIn |4 edt | |
776 | 1 | |z 9780124166943 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124166943 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780124166882/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047404825 |
---|---|
_version_ | 1821494910084186112 |
adam_text | |
any_adam_object | |
author2 | Vacca, John R. |
author2_role | edt |
author2_variant | j r v jr jrv |
author_facet | Vacca, John R. |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047404825 (DE-599)KEP047404825 (ORHE)9780124166882 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02740cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-047404825</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115355.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166943</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-416694-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124166946</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-416694-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166882</subfield><subfield code="9">978-0-12-416688-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404825</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047404825</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780124166882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404825</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing information security</subfield><subfield code="c">edited by John R. Vacca</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 347 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Centres de traitement de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres électroniques</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vacca, John R.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780124166943</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124166943</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780124166882/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047404825 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:53Z |
institution | BVB |
isbn | 9780124166943 0124166946 9780124166882 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxiv, 347 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Managing information security edited by John R. Vacca 2nd edition Waltham, MA Syngress 2014 1 Online-Ressource (xxiv, 347 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record This book offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Computer security Management Electronic data processing departments Security measures Computer networks Security measures Penetration testing (Computer security) Sécurité informatique ; Gestion Centres de traitement de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Electronic data processing departments ; Security measures Livres électroniques Vacca, John R. HerausgeberIn edt 9780124166943 Erscheint auch als Druck-Ausgabe 9780124166943 |
spellingShingle | Managing information security Computer security Management Electronic data processing departments Security measures Computer networks Security measures Penetration testing (Computer security) Sécurité informatique ; Gestion Centres de traitement de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Electronic data processing departments ; Security measures Livres électroniques |
title | Managing information security |
title_auth | Managing information security |
title_exact_search | Managing information security |
title_full | Managing information security edited by John R. Vacca |
title_fullStr | Managing information security edited by John R. Vacca |
title_full_unstemmed | Managing information security edited by John R. Vacca |
title_short | Managing information security |
title_sort | managing information security |
topic | Computer security Management Electronic data processing departments Security measures Computer networks Security measures Penetration testing (Computer security) Sécurité informatique ; Gestion Centres de traitement de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Electronic data processing departments ; Security measures Livres électroniques |
topic_facet | Computer security Management Electronic data processing departments Security measures Computer networks Security measures Penetration testing (Computer security) Sécurité informatique ; Gestion Centres de traitement de l'information ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer security ; Management Electronic data processing departments ; Security measures Livres électroniques |
work_keys_str_mv | AT vaccajohnr managinginformationsecurity |