How to Cheat at Managing Information Security

  • ID: 1766186
  • Book
  • 400 Pages
  • Elsevier Science and Technology
1 of 4
This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.

These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.

Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: . Design the organization chart of his new security organization . Design and implement policies and strategies . Navigate his way through jargon filled meetings . Understand the design flaws of his E-commerce and DMZ infrastructure

* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies

* Navigate through jargon filled meetings with this handy aid

* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure
Note: Product cover images may vary from those shown
2 of 4
Chapter 1: Preface and Introduction Chapter 2: The Security Organization Chapter 3: The Information Security Policy Chapter 4: Jargon, principles and concepts Chapter 5: Information Security laws and regulations Chapter 6: Information Security Standards and Audits Chapter 7: Interviews, Bosses and Staff Chapter 8: Infrastructure security Chapter 9: Firewalls Chapter 10: Intruder detection systems
Theory Chapter 11: Intruder detection systems
In Practice Chapter 12: Intruder Prevention and Protection Chapter13: Network penetration testing Chapter14: Application security flaws and application testing
Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Osborne, Mark
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll