Syngress IT security project management handbook: = IT security project management handbook
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
2006
|
Schriftenreihe: | ITpro collection
|
Schlagworte: | |
Beschreibung: | 1 online resource (xxvi, 612 pages) illustrations |
ISBN: | 9780080489773 008048977X 9781423789734 1423789733 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045341370 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181206s2006 |||| o||u| ||||||eng d | ||
020 | |a 9780080489773 |9 978-0-08-048977-3 | ||
020 | |a 008048977X |9 0-08-048977-X | ||
020 | |a 9781423789734 |9 978-1-4237-8973-4 | ||
020 | |a 1423789733 |9 1-4237-8973-3 | ||
035 | |a (ZDB-4-ENC)ocm70844414 | ||
035 | |a (OCoLC)70844414 | ||
035 | |a (DE-599)BVBBV045341370 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8/068 |2 22 | |
100 | 1 | |a Snedaker, Susan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Syngress IT security project management handbook |b = IT security project management handbook |c Susan Snedaker ; Russ Rogers, technical editor |
246 | 1 | 3 | |a IT security project management handbook |
246 | 1 | 1 | |a IT security project management handbook |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c 2006 | |
300 | |a 1 online resource (xxvi, 612 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a ITpro collection | |
505 | 8 | |a The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures / Handbooks, manuals, etc |2 blmlsh | |
650 | 7 | |a Computer security / Management / Handbooks, manuals, etc |2 blmlsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security / Management |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc |a Computer security |x Management |v Handbooks, manuals, etc | |
700 | 1 | |a Rogers, Russ |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Snedaker, Susan |t Syngress IT security project management handbook |d Rockland, Mass. : Syngress, 2006 |z 1597490768 |z 9781597490764 |
912 | |a ZDB-4-ENC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030728073 |
Datensatz im Suchindex
_version_ | 1804179157980020736 |
---|---|
any_adam_object | |
author | Snedaker, Susan |
author_facet | Snedaker, Susan |
author_role | aut |
author_sort | Snedaker, Susan |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV045341370 |
collection | ZDB-4-ENC |
contents | The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments |
ctrlnum | (ZDB-4-ENC)ocm70844414 (OCoLC)70844414 (DE-599)BVBBV045341370 |
dewey-full | 005.8/068 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/068 |
dewey-search | 005.8/068 |
dewey-sort | 15.8 268 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03017nmm a2200481zc 4500</leader><controlfield tag="001">BV045341370</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181206s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489773</subfield><subfield code="9">978-0-08-048977-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048977X</subfield><subfield code="9">0-08-048977-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423789734</subfield><subfield code="9">978-1-4237-8973-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423789733</subfield><subfield code="9">1-4237-8973-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ENC)ocm70844414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70844414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045341370</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/068</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Syngress IT security project management handbook</subfield><subfield code="b">= IT security project management handbook</subfield><subfield code="c">Susan Snedaker ; Russ Rogers, technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">IT security project management handbook</subfield></datafield><datafield tag="246" ind1="1" ind2="1"><subfield code="a">IT security project management handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 612 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">ITpro collection</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures / Handbooks, manuals, etc</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management / Handbooks, manuals, etc</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Snedaker, Susan</subfield><subfield code="t">Syngress IT security project management handbook</subfield><subfield code="d">Rockland, Mass. : Syngress, 2006</subfield><subfield code="z">1597490768</subfield><subfield code="z">9781597490764</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ENC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030728073</subfield></datafield></record></collection> |
id | DE-604.BV045341370 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:25Z |
institution | BVB |
isbn | 9780080489773 008048977X 9781423789734 1423789733 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030728073 |
oclc_num | 70844414 |
open_access_boolean | |
physical | 1 online resource (xxvi, 612 pages) illustrations |
psigel | ZDB-4-ENC |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub. |
record_format | marc |
series2 | ITpro collection |
spelling | Snedaker, Susan Verfasser aut Syngress IT security project management handbook = IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor IT security project management handbook Rockland, MA Syngress Pub. 2006 1 online resource (xxvi, 612 pages) illustrations txt rdacontent c rdamedia cr rdacarrier ITpro collection The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Handbooks, manuals, etc blmlsh Computer security / Management / Handbooks, manuals, etc blmlsh Computer networks / Security measures fast Computer security / Management fast Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc Rogers, Russ Sonstige oth Erscheint auch als Druck-Ausgabe Snedaker, Susan Syngress IT security project management handbook Rockland, Mass. : Syngress, 2006 1597490768 9781597490764 |
spellingShingle | Snedaker, Susan Syngress IT security project management handbook = IT security project management handbook The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Handbooks, manuals, etc blmlsh Computer security / Management / Handbooks, manuals, etc blmlsh Computer networks / Security measures fast Computer security / Management fast Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc |
title | Syngress IT security project management handbook = IT security project management handbook |
title_alt | IT security project management handbook |
title_auth | Syngress IT security project management handbook = IT security project management handbook |
title_exact_search | Syngress IT security project management handbook = IT security project management handbook |
title_full | Syngress IT security project management handbook = IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_fullStr | Syngress IT security project management handbook = IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_full_unstemmed | Syngress IT security project management handbook = IT security project management handbook Susan Snedaker ; Russ Rogers, technical editor |
title_short | Syngress IT security project management handbook |
title_sort | syngress it security project management handbook it security project management handbook |
title_sub | = IT security project management handbook |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Handbooks, manuals, etc blmlsh Computer security / Management / Handbooks, manuals, etc blmlsh Computer networks / Security measures fast Computer security / Management fast Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures / Handbooks, manuals, etc Computer security / Management / Handbooks, manuals, etc Computer networks / Security measures Computer security / Management Computer networks Security measures Handbooks, manuals, etc Computer security Management Handbooks, manuals, etc |
work_keys_str_mv | AT snedakersusan syngressitsecurityprojectmanagementhandbookitsecurityprojectmanagementhandbook AT rogersruss syngressitsecurityprojectmanagementhandbookitsecurityprojectmanagementhandbook AT snedakersusan itsecurityprojectmanagementhandbook AT rogersruss itsecurityprojectmanagementhandbook |