Syngress IT security project management handbook:
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Ac...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
2006
|
Schriftenreihe: | ITpro collection
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/1597490768/?ar |
Zusammenfassung: | The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. |
Umfang: | 1 Online-Ressource (xxvi, 612 Seiten) illustrations. |
ISBN: | 9780080489773 008048977X 9781423789734 1423789733 1281035718 9781281035714 9786611035716 6611035710 9781597491259 159749125X 1597490768 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051701340 | ||
003 | DE-627-1 | ||
005 | 20240228114031.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2006 xx |||||o 00| ||eng c | ||
020 | |a 9780080489773 |9 978-0-08-048977-3 | ||
020 | |a 008048977X |9 0-08-048977-X | ||
020 | |a 9781423789734 |9 978-1-4237-8973-4 | ||
020 | |a 1423789733 |9 1-4237-8973-3 | ||
020 | |a 1281035718 |9 1-281-03571-8 | ||
020 | |a 9781281035714 |9 978-1-281-03571-4 | ||
020 | |a 9786611035716 |9 9786611035716 | ||
020 | |a 6611035710 |9 6611035710 | ||
020 | |a 9781597491259 |c online |9 978-1-59749-125-9 | ||
020 | |a 159749125X |9 1-59749-125-X | ||
020 | |a 1597490768 |9 1-59749-076-8 | ||
035 | |a (DE-627-1)051701340 | ||
035 | |a (DE-599)KEP051701340 | ||
035 | |a (ORHE)1597490768 | ||
035 | |a (DE-627-1)051701340 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8/068 |2 22 | |
100 | 1 | |a Snedaker, Susan |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Syngress IT security project management handbook |c Susan Snedaker ; Russ Rogers, technical editor |
246 | 3 | 3 | |a IT security project management handbook |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c 2006 | |
300 | |a 1 Online-Ressource (xxvi, 612 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a ITpro collection | |
520 | |a The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |v Handbooks, manuals, etc |x Security measures | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc |x Management | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc | |
650 | 4 | |a Sécurité informatique ; Gestion ; Guides, manuels, etc | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures ; Handbooks, manuals, etc | |
650 | 4 | |a Computer security ; Management ; Handbooks, manuals, etc | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a handbooks | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Guides et manuels | |
655 | 2 | |a Handbook | |
700 | 1 | |a Rogers, Russ |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597490768 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597490768 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/1597490768/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051701340 |
---|---|
_version_ | 1821494841199034368 |
adam_text | |
any_adam_object | |
author | Snedaker, Susan |
author2 | Rogers, Russ |
author2_role | ctb |
author2_variant | r r rr |
author_facet | Snedaker, Susan Rogers, Russ |
author_role | aut |
author_sort | Snedaker, Susan |
author_variant | s s ss |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051701340 (DE-599)KEP051701340 (ORHE)1597490768 |
dewey-full | 005.8/068 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/068 |
dewey-search | 005.8/068 |
dewey-sort | 15.8 268 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03737cam a22007452 4500</leader><controlfield tag="001">ZDB-30-ORH-051701340</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114031.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2006 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489773</subfield><subfield code="9">978-0-08-048977-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048977X</subfield><subfield code="9">0-08-048977-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423789734</subfield><subfield code="9">978-1-4237-8973-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423789733</subfield><subfield code="9">1-4237-8973-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035718</subfield><subfield code="9">1-281-03571-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035714</subfield><subfield code="9">978-1-281-03571-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035716</subfield><subfield code="9">9786611035716</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611035710</subfield><subfield code="9">6611035710</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491259</subfield><subfield code="c">online</subfield><subfield code="9">978-1-59749-125-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749125X</subfield><subfield code="9">1-59749-125-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490768</subfield><subfield code="9">1-59749-076-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051701340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051701340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)1597490768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051701340</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/068</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Syngress IT security project management handbook</subfield><subfield code="c">Susan Snedaker ; Russ Rogers, technical editor</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">IT security project management handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 612 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">ITpro collection</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Handbooks, manuals, etc</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures ; Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management ; Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">handbooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guides et manuels</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Handbook</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597490768</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490768</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/1597490768/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
genre | Handbook |
genre_facet | Handbook |
id | ZDB-30-ORH-051701340 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:47Z |
institution | BVB |
isbn | 9780080489773 008048977X 9781423789734 1423789733 1281035718 9781281035714 9786611035716 6611035710 9781597491259 159749125X 1597490768 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvi, 612 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub. |
record_format | marc |
series2 | ITpro collection |
spelling | Snedaker, Susan VerfasserIn aut Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor IT security project management handbook Rockland, MA Syngress Pub. 2006 1 Online-Ressource (xxvi, 612 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier ITpro collection The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. English. Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Management Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Gestion ; Guides, manuels, etc COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Handbooks, manuals, etc Computer security ; Management ; Handbooks, manuals, etc Computer networks ; Security measures Computer security ; Management handbooks Handbooks and manuals Guides et manuels Handbook Rogers, Russ MitwirkendeR ctb 1597490768 Erscheint auch als Druck-Ausgabe 1597490768 |
spellingShingle | Snedaker, Susan Syngress IT security project management handbook Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Management Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Gestion ; Guides, manuels, etc COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Handbooks, manuals, etc Computer security ; Management ; Handbooks, manuals, etc Computer networks ; Security measures Computer security ; Management handbooks Handbooks and manuals Guides et manuels |
title | Syngress IT security project management handbook |
title_alt | IT security project management handbook |
title_auth | Syngress IT security project management handbook |
title_exact_search | Syngress IT security project management handbook |
title_full | Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_fullStr | Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_full_unstemmed | Syngress IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_short | Syngress IT security project management handbook |
title_sort | syngress it security project management handbook |
topic | Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Management Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Gestion ; Guides, manuels, etc COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Handbooks, manuals, etc Computer security ; Management ; Handbooks, manuals, etc Computer networks ; Security measures Computer security ; Management handbooks Handbooks and manuals Guides et manuels |
topic_facet | Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Management Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Gestion ; Guides, manuels, etc COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Handbooks, manuals, etc Computer security ; Management ; Handbooks, manuals, etc Computer networks ; Security measures Computer security ; Management handbooks Handbooks and manuals Guides et manuels Handbook |
work_keys_str_mv | AT snedakersusan syngressitsecurityprojectmanagementhandbook AT rogersruss syngressitsecurityprojectmanagementhandbook AT snedakersusan itsecurityprojectmanagementhandbook AT rogersruss itsecurityprojectmanagementhandbook |