The Secured Enterprise PDF ePub eBook

Books Info:

The Secured Enterprise free pdf Securing your key digital and information assets in an age of insecurity. Securing enterprise data, applications, and intellectual property has become THE critical issue for business decision-makers in this era of hackers and potential cyberterrorism. But until now, most books on information security have been written for programmers and networking professionals, not business people. The Secured Enterprise: Protecting Your Information Assets fills the gap, delivering a non-technical, business-focused briefing on every key aspect of information security: frompeople to process to technology. *A guide to today's security threats--including cyberterrorism*How to establish effective, realistic security policies*The tools for defending your information assets*Effective mechanisms for identification, authentication, and access control*What firewalls can--and cannot--do*Vulnerability scanners, virus detectors, and intrusion detection systems*Virtual private networks: leveraging the cost savings without exposing your data to risk*Securing B2B and B2C e-commerce*How to evaluate third-party security products and services*New security options for wireless applicationsSecurity has gotten more complex with time, and it has become more difficult to distill it. After reading this book you will understand security better and be more prepared to apply it in your enterprise.--Jeff Moss, Founder, DEF CON President, Black Hat, Inc.

About Paul Proctor

PAUL E. PROCTOR has worked with the CIA, FBI, and NSA on security issues andled a study of state-of-the-art intrusion detection methodology for the U.S. government.Currently Senior Vice President for NFR Security, Inc., he has spent his entire careerdeveloping information security systems and assisting large enterprises in theirdeployment. Proctor is also author of The Practical Intrusion Detection Handbook(Prentice Hall PTR). F. CHRISTIAN BYRNES has worked for IBM, Oxford Software Corporation, andMETA Group. He is author of Security in Enterprise Computing: A Practical Guide, aglobal best-practices report that has become the benchmark for enterprise securityprocess formation by META Group clients worldwide.

Details Book

Author : Paul Proctor
Publisher : Prentice Hall PTR
Data Published : 28 February 2002
ISBN : 013061906X
EAN : 9780130619068
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 336 pages
Age + : 18 years
Language : English
Rating :

Reviews The Secured Enterprise



17 Comments Add a comment




Related eBooks Download


  • Implementing Information Security Based on ISO 27001/ISO 27002 free pdfImplementing Information Security Based on ISO 27001/ISO 27002

    Information is the currency of the information age and in many cases is the most valuable asset possessed by an organisation. Information security management is the discipline that focuses on protecting and securing these assets against the threats of natural disasters..


  • Official (ISC)2R Guide to the ISSMPR CBKR free pdfOfficial (ISC)2R Guide to the ISSMPR CBKR

    As the recognized leader in the field of information security education and certification. the (ISC)2AR promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMPAR) examination assesses individuals' understanding of security management practices..


  • Official (ISC)2R Guide to the ISSMPR CBKR free pdfOfficial (ISC)2R Guide to the ISSMPR CBKR

    As the recognized leader in the field of information security education and certification. the (ISC)2AR promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMPAR) examination assesses individuals' understanding of security management practices..


  • Security and Protection in Information Processing Systems free pdfSecurity and Protection in Information Processing Systems

    Security is probably the most critical factor for the development of the "Information Society". E-government. e-commerce. e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology..


  • Zen and the Art of Information Security free pdfZen and the Art of Information Security

    While security is generally perceived to be a complicated and expensive process. Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical..


  • The Secured Enterprise free pdfThe Secured Enterprise

    . Securing your key digital and information assets in an age of insecurity. Securing enterprise data, applications, and intellectual property has become THE critical issue for business decision-makers