Physical and logical security convergence powered by enterprise security management:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxvi, 566 p.) |
ISBN: | 9781597491228 1597491225 9780080558783 008055878X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305686 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781597491228 |9 978-1-59749-122-8 | ||
020 | |a 1597491225 |9 1-59749-122-5 | ||
020 | |a 9780080558783 |c electronic bk. |9 978-0-08-055878-3 | ||
020 | |a 008055878X |c electronic bk. |9 0-08-055878-X | ||
035 | |a (ZDB-33-EBS)ocn228148066 | ||
035 | |a (OCoLC)228148066 | ||
035 | |a (DE-599)BVBBV042305686 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
082 | 0 | |a 658.478 |2 22 | |
245 | 1 | 0 | |a Physical and logical security convergence powered by enterprise security management |c Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (xxvi, 566 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology |2 fast | |
650 | 4 | |a Information technology | |
650 | 4 | |a Computer security | |
653 | |a Electronic books | ||
700 | 1 | |a Contos, Brian T. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491228 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742678 |
Datensatz im Suchindex
_version_ | 1804152889082380288 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042305686 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn228148066 (OCoLC)228148066 (DE-599)BVBBV042305686 |
dewey-full | 005.8 658.478 |
dewey-hundreds | 000 - Computer science, information, general works 600 - Technology (Applied sciences) |
dewey-ones | 005 - Computer programming, programs, data, security 658 - General management |
dewey-raw | 005.8 658.478 |
dewey-search | 005.8 658.478 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02939nmm a2200505zc 4500</leader><controlfield tag="001">BV042305686</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491228</subfield><subfield code="9">978-1-59749-122-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491225</subfield><subfield code="9">1-59749-122-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558783</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055878-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008055878X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055878-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn228148066</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228148066</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305686</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical and logical security convergence powered by enterprise security management</subfield><subfield code="c">Brian T. Contos ... [et al.] ; foreword by Regis McKenna</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 566 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Contos, Brian T.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491228</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742678</subfield></datafield></record></collection> |
id | DE-604.BV042305686 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:53Z |
institution | BVB |
isbn | 9781597491228 1597491225 9780080558783 008055878X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742678 |
oclc_num | 228148066 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxvi, 566 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna Burlington, MA Syngress Pub. c2007 1 Online-Ressource (xxvi, 566 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide Includes bibliographical references and index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information technology fast Information technology Computer security Electronic books Contos, Brian T. Sonstige oth http://www.sciencedirect.com/science/book/9781597491228 Verlag Volltext |
spellingShingle | Physical and logical security convergence powered by enterprise security management COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information technology fast Information technology Computer security |
title | Physical and logical security convergence powered by enterprise security management |
title_auth | Physical and logical security convergence powered by enterprise security management |
title_exact_search | Physical and logical security convergence powered by enterprise security management |
title_full | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
title_fullStr | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
title_full_unstemmed | Physical and logical security convergence powered by enterprise security management Brian T. Contos ... [et al.] ; foreword by Regis McKenna |
title_short | Physical and logical security convergence powered by enterprise security management |
title_sort | physical and logical security convergence powered by enterprise security management |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Information technology fast Information technology Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Information technology |
url | http://www.sciencedirect.com/science/book/9781597491228 |
work_keys_str_mv | AT contosbriant physicalandlogicalsecurityconvergencepoweredbyenterprisesecuritymanagement |