000 01861cam a22002537i 4500
005 20150915130151.0
008 140801t20142014mau b 001 0 eng d
020 _a9780124166882
020 _a0124166881 (pbk.)
041 _aeng
082 0 4 _a005.8
_bVAC
100 _aVacca, John R. ed.
_95617
245 0 0 _aManaging information security
_cVacca, John ed.
250 _a2nd ed.
300 _axxiv, 347 p.
500 _aPrevious edition: 2010.
520 3 _a"Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions". -- Cover.
650 0 _aComputer security
_xManagement.
_91823
650 0 _aElectronic data processing departments
_xSecurity measures.
_91824
650 0 _aComputer networks
_xSecurity measures.
_91825
650 0 _aPenetration testing (Computer security)
_91826
700 1 _aVacca, John R.,
_91827
942 _cBK
999 _c26255
_d26255