Security Architecture: Design, Deployment and Operations
McGraw-Hill Professional (Verlag)
978-0-07-213385-1 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
New from the official RSA Press, this expert resource explains how to design and deploy security successfully across your enterprise--and keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems, plus real-world case studies.
Christopher King CISSP (Andover, MA) (Certified Information Systems Security Professional) is the Managing Principal of Greenwich Technology Partners. He has over 15 years of experience with various corporations such as Bell Atlantic, McGraw-Hill and Fidelity Investments as an Information Security consultant. Prior to joining Greenwich Technology Partners he served as a Cryptographic Engineer with The National Security Agency. He's a regular contributor to Information Security Magazine, Business Communication Review and Computer Security Review. Curtis Dalton (Georgetown, MA) CISSP, CCIE is a Consulting Engineer with Greenwich Technology Partners. He has over 12 years experience with companies such as Siemens Information and Communications Networks, Boston Technology Corp and Xerox designing and deploying large-scale network solutions in industries ranging from finance to telecommunications, manufacturing, and R&D. Ertam Osmanoglu (Malden, MA) is a Security Engineer with Greenwich Technology Partners. He has over over 5 years experience providing systems and security consulting and support services for Ernst and Young.
Chapter 1: Business and Application Drivers (Case Study) Chapter 2: Security Polices, Standards, and Guidelines Chapter 3: Information Classification and Access Control Plan Chapter 4: Applying the Policies to Derive the Requirements Chapter 5: Security Infrastructure Design Principles Chapter 6: Network Partitioning Chapter 7: Virtual Private Networks Chapter 8: Wireless Security Chapter 9: Platform Hardening Chapter 10: Intrusion Detection Systems Chapter 11: Application Security Chapter 12: PKI: Components and Applications Chapter 13: Security Event Management and Consolidation Chapter 14: Security Management Chapter 15: Validation and Maturity
Erscheint lt. Verlag | 16.8.2001 |
---|---|
Zusatzinfo | 200ill. |
Sprache | englisch |
Maße | 191 x 234 mm |
Gewicht | 1003 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-07-213385-6 / 0072133856 |
ISBN-13 | 978-0-07-213385-1 / 9780072133851 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich