Managing information security:
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerabilit...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam Waltham, MA
Syngress
2014
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions |
Beschreibung: | 1 online resource |
ISBN: | 1299808344 9781299808348 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126173 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2014 |||| o||u| ||||||eng d | ||
020 | |a 1299808344 |9 1-299-80834-4 | ||
020 | |a 9781299808348 |9 978-1-299-80834-8 | ||
035 | |a (ZDB-33-ESD)ocn857278502 | ||
035 | |a (OCoLC)857278502 | ||
035 | |a (DE-599)BVBBV046126173 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Managing information security |c edited by John R. Vacca |
250 | |a 2nd ed | ||
264 | 1 | |a Amsterdam |a Waltham, MA |b Syngress |c 2014 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security / Management |2 fast | |
650 | 7 | |a Electronic data processing departments / Security measures |2 fast | |
650 | 4 | |a Computer security |x Management | |
650 | 4 | |a Electronic data processing departments |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Vacca, John R. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0124166881 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124166882 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124166882 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506626 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124166882 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180446019321856 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046126173 |
classification_rvk | ST 277 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn857278502 (OCoLC)857278502 (DE-599)BVBBV046126173 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03233nmm a2200541zc 4500</leader><controlfield tag="001">BV046126173</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299808344</subfield><subfield code="9">1-299-80834-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299808348</subfield><subfield code="9">978-1-299-80834-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn857278502</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)857278502</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126173</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing information security</subfield><subfield code="c">edited by John R. Vacca</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vacca, John R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0124166881</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124166882</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124166882</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506626</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124166882</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV046126173 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:53Z |
institution | BVB |
isbn | 1299808344 9781299808348 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506626 |
oclc_num | 857278502 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Managing information security edited by John R. Vacca 2nd ed Amsterdam Waltham, MA Syngress 2014 1 online resource txt rdacontent c rdamedia cr rdacarrier Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions Computer networks / Security measures fast Computer security / Management fast Electronic data processing departments / Security measures fast Computer security Management Electronic data processing departments Security measures Computer networks Security measures Netzwerk (DE-588)4171529-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Netzwerk (DE-588)4171529-9 s Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Vacca, John R. Sonstige oth Erscheint auch als Druck-Ausgabe 0124166881 Erscheint auch als Druck-Ausgabe 9780124166882 http://www.sciencedirect.com/science/book/9780124166882 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Managing information security Computer networks / Security measures fast Computer security / Management fast Electronic data processing departments / Security measures fast Computer security Management Electronic data processing departments Security measures Computer networks Security measures Netzwerk (DE-588)4171529-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4171529-9 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Managing information security |
title_auth | Managing information security |
title_exact_search | Managing information security |
title_full | Managing information security edited by John R. Vacca |
title_fullStr | Managing information security edited by John R. Vacca |
title_full_unstemmed | Managing information security edited by John R. Vacca |
title_short | Managing information security |
title_sort | managing information security |
topic | Computer networks / Security measures fast Computer security / Management fast Electronic data processing departments / Security measures fast Computer security Management Electronic data processing departments Security measures Computer networks Security measures Netzwerk (DE-588)4171529-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks / Security measures Computer security / Management Electronic data processing departments / Security measures Computer security Management Electronic data processing departments Security measures Computer networks Security measures Netzwerk Computersicherheit Aufsatzsammlung |
url | http://www.sciencedirect.com/science/book/9780124166882 |
work_keys_str_mv | AT vaccajohnr managinginformationsecurity |