Information Security
Strategies for Understanding and Reducing Risks
Seiten
2007
John Wiley & Sons Ltd (Hersteller)
978-0-470-85907-0 (ISBN)
John Wiley & Sons Ltd (Hersteller)
978-0-470-85907-0 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
At last, Gattiker has provided the book that every IT security person should own to do their job! In short, a book that teaches you all you need to know about security and explains WHY certain issues are important. * Unique approach treats the network as a whole 'living' entity (sick system vs.
At last, Gattiker has provided the book that every IT security person should own to do their job! In short, a book that teaches you all you need to know about security and explains why certain issues are important. This unique approach treats the network as a whole 'living' entity (sick system vs. healthy system). It has a comprehensive overview of concepts, methods and theories of information security, including wireless networks. It presents complete and easy to read explanation of common strategy and tools. It uses and defines consistent terminology. It has emphasis on concepts that are explained with the help of examples to link theory with practice. It gives advice on the necessary human, technical and financial resources for critical IT infrastructures. It is especially useful for readers in applied fields such as systems design, security auditing, vulnerability testing, and role based access management.
At last, Gattiker has provided the book that every IT security person should own to do their job! In short, a book that teaches you all you need to know about security and explains why certain issues are important. This unique approach treats the network as a whole 'living' entity (sick system vs. healthy system). It has a comprehensive overview of concepts, methods and theories of information security, including wireless networks. It presents complete and easy to read explanation of common strategy and tools. It uses and defines consistent terminology. It has emphasis on concepts that are explained with the help of examples to link theory with practice. It gives advice on the necessary human, technical and financial resources for critical IT infrastructures. It is especially useful for readers in applied fields such as systems design, security auditing, vulnerability testing, and role based access management.
Erscheint lt. Verlag | 30.3.2007 |
---|---|
Verlagsort | Chichester |
Sprache | englisch |
Maße | 168 x 244 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Technik ► Elektrotechnik / Energietechnik | |
ISBN-10 | 0-470-85907-5 / 0470859075 |
ISBN-13 | 978-0-470-85907-0 / 9780470859070 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |