Syngress IT security project management handbook /:
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Ac...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2006.
|
Schriftenreihe: | ITpro collection.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. |
Beschreibung: | 1 online resource (xxvi, 612 pages) : illustrations. |
ISBN: | 9780080489773 008048977X 9781423789734 1423789733 1281035718 9781281035714 9786611035716 6611035710 9781597491259 159749125X |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm70844414 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 060807s2006 maua of 001 0 eng c | ||
040 | |a VYF |b eng |e pn |c VYF |d BAKER |d IXA |d UMC |d YDXCP |d OCLCQ |d QE2 |d OCLCQ |d SDB |d BTCTA |d SINLB |d CPC |d OCLCQ |d OCLCF |d NLGGC |d OCLCQ |d N$T |d TUU |d UMI |d TXJ |d CEF |d DEBSZ |d CNNAI |d OPELS |d UV0 |d DKDLA |d BDX |d ZCU |d IDEBK |d MERUC |d CCO |d E7B |d OCL |d MKN |d AU@ |d MHW |d K6U |d B24X7 |d OCLCQ |d COO |d OCLCQ |d D6H |d AZK |d LOA |d CNNOR |d COCUF |d JBG |d MOR |d PIFBR |d OCLCQ |d WY@ |d U3W |d OCLCA |d LUE |d STF |d OCLCQ |d BRL |d LND |d WRM |d GILDS |d WCO |d VTS |d AGLDB |d OCLCQ |d INT |d NRAMU |d MOQ |d VT2 |d OCLCQ |d A6Q |d G3B |d OCLCQ |d LEAUB |d M8D |d OCLCO |d OL$ |d OCLCA |d OCLCQ |d OCLCO |d VLY |d INARC |d LVT |d UKCRE |d QGK |d BRF |d EYM |d OCLCO |d OCLCQ |d IOY |d OCLCO |d OCLCL | ||
019 | |a 70792038 |a 71520060 |a 71665411 |a 72763213 |a 162597499 |a 176042186 |a 181421134 |a 228145003 |a 228145004 |a 481918105 |a 507575457 |a 560260778 |a 647580050 |a 722510417 |a 728025414 |a 744603950 |a 759522125 |a 765142699 |a 781250873 |a 888768316 |a 961515679 |a 962712395 |a 966203657 |a 988492282 |a 991937134 |a 1035706356 |a 1037439064 |a 1038403690 |a 1044249510 |a 1045537158 |a 1050128596 |a 1056396427 |a 1060200214 |a 1074330799 |a 1081270729 |a 1091368874 |a 1100905762 |a 1103592927 |a 1153017429 |a 1162580214 |a 1179815815 |a 1241947661 |a 1302262884 | ||
020 | |a 9780080489773 | ||
020 | |a 008048977X | ||
020 | |a 9781423789734 | ||
020 | |a 1423789733 | ||
020 | |z 9781597490764 | ||
020 | |z 1597490768 | ||
020 | |a 1281035718 | ||
020 | |a 9781281035714 | ||
020 | |a 9786611035716 | ||
020 | |a 6611035710 | ||
020 | 0 | |a 9781597491259 |q (online) | |
020 | |a 159749125X | ||
024 | 1 | |a 792502907689 | |
035 | |a (OCoLC)70844414 |z (OCoLC)70792038 |z (OCoLC)71520060 |z (OCoLC)71665411 |z (OCoLC)72763213 |z (OCoLC)162597499 |z (OCoLC)176042186 |z (OCoLC)181421134 |z (OCoLC)228145003 |z (OCoLC)228145004 |z (OCoLC)481918105 |z (OCoLC)507575457 |z (OCoLC)560260778 |z (OCoLC)647580050 |z (OCoLC)722510417 |z (OCoLC)728025414 |z (OCoLC)744603950 |z (OCoLC)759522125 |z (OCoLC)765142699 |z (OCoLC)781250873 |z (OCoLC)888768316 |z (OCoLC)961515679 |z (OCoLC)962712395 |z (OCoLC)966203657 |z (OCoLC)988492282 |z (OCoLC)991937134 |z (OCoLC)1035706356 |z (OCoLC)1037439064 |z (OCoLC)1038403690 |z (OCoLC)1044249510 |z (OCoLC)1045537158 |z (OCoLC)1050128596 |z (OCoLC)1056396427 |z (OCoLC)1060200214 |z (OCoLC)1074330799 |z (OCoLC)1081270729 |z (OCoLC)1091368874 |z (OCoLC)1100905762 |z (OCoLC)1103592927 |z (OCoLC)1153017429 |z (OCoLC)1162580214 |z (OCoLC)1179815815 |z (OCoLC)1241947661 |z (OCoLC)1302262884 | ||
037 | |a CL0500000005 |b Safari Books Online | ||
042 | |a pcc | ||
050 | 4 | |a QA76.9.A25 |b S655 2006 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8/068 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Snedaker, Susan. |0 http://id.loc.gov/authorities/names/n2001015003 | |
245 | 1 | 0 | |a Syngress IT security project management handbook / |c Susan Snedaker ; Russ Rogers, technical editor. |
246 | 3 | 0 | |a IT security project management handbook |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2006. | ||
300 | |a 1 online resource (xxvi, 612 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a ITpro collection | |
505 | 0 | |a Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. | |
520 | |a The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures |v Handbooks, manuals, etc. | |
650 | 0 | |a Computer security |x Management |v Handbooks, manuals, etc. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Guides, manuels, etc. | |
650 | 6 | |a Sécurité informatique |x Gestion |v Guides, manuels, etc. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |x Handbooks, manuals, etc. |2 blmlsh | |
650 | 7 | |a Computer security |x Management |x Handbooks, manuals, etc. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
655 | 0 | |a Electronic books. | |
655 | 2 | |a Handbook |0 https://id.nlm.nih.gov/mesh/D020479 | |
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026109 | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
700 | 1 | |a Rogers, Russ. |0 http://id.loc.gov/authorities/names/no2004020328 | |
758 | |i has work: |a Syngress IT security project management handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG7w6d3hYKDr9Y9VfjhwkC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Snedaker, Susan. |t Syngress IT security project management handbook. |d Rockland, Mass. : Syngress, ©2006 |z 1597490768 |z 9781597490764 |w (OCoLC)811354027 |
830 | 0 | |a ITpro collection. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490764 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163063 |3 Volltext |
938 | |a Internet Archive |b INAR |n syngressitsecuri0000sned | ||
938 | |a Books 24x7 |b B247 |n bks00014082 | ||
938 | |a Baker & Taylor |b BKTY |c 59.95 |d 44.96 |i 1597490768 |n 0006736970 |s active | ||
938 | |a Brodart |b BROD |n 05689589 |c $59.95 | ||
938 | |a Baker and Taylor |b BTCP |n BK0006935963 | ||
938 | |a ebrary |b EBRY |n ebr10142560 | ||
938 | |a EBSCOhost |b EBSC |n 163063 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 103571 | ||
938 | |a YBP Library Services |b YANK |n 2627195 | ||
938 | |a YBP Library Services |b YANK |n 2730639 | ||
938 | |a YBP Library Services |b YANK |n 2456720 | ||
938 | |a YBP Library Services |b YANK |n 2439189 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm70844414 |
---|---|
_version_ | 1816881640648998912 |
adam_text | |
any_adam_object | |
author | Snedaker, Susan |
author2 | Rogers, Russ |
author2_role | |
author2_variant | r r rr |
author_GND | http://id.loc.gov/authorities/names/n2001015003 http://id.loc.gov/authorities/names/no2004020328 |
author_facet | Snedaker, Susan Rogers, Russ |
author_role | |
author_sort | Snedaker, Susan |
author_variant | s s ss |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S655 2006 |
callnumber-search | QA76.9.A25 S655 2006 |
callnumber-sort | QA 276.9 A25 S655 42006 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. |
ctrlnum | (OCoLC)70844414 |
dewey-full | 005.8/068 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/068 |
dewey-search | 005.8/068 |
dewey-sort | 15.8 268 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07375cam a2200973 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm70844414 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">060807s2006 maua of 001 0 eng c</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">VYF</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">VYF</subfield><subfield code="d">BAKER</subfield><subfield code="d">IXA</subfield><subfield code="d">UMC</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QE2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SDB</subfield><subfield code="d">BTCTA</subfield><subfield code="d">SINLB</subfield><subfield code="d">CPC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">TUU</subfield><subfield code="d">UMI</subfield><subfield code="d">TXJ</subfield><subfield code="d">CEF</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">CNNAI</subfield><subfield code="d">OPELS</subfield><subfield code="d">UV0</subfield><subfield code="d">DKDLA</subfield><subfield code="d">BDX</subfield><subfield code="d">ZCU</subfield><subfield code="d">IDEBK</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">OCL</subfield><subfield code="d">MKN</subfield><subfield code="d">AU@</subfield><subfield code="d">MHW</subfield><subfield code="d">K6U</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">CNNOR</subfield><subfield code="d">COCUF</subfield><subfield code="d">JBG</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRL</subfield><subfield code="d">LND</subfield><subfield code="d">WRM</subfield><subfield code="d">GILDS</subfield><subfield code="d">WCO</subfield><subfield code="d">VTS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">NRAMU</subfield><subfield code="d">MOQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">G3B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VLY</subfield><subfield code="d">INARC</subfield><subfield code="d">LVT</subfield><subfield code="d">UKCRE</subfield><subfield code="d">QGK</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">70792038</subfield><subfield code="a">71520060</subfield><subfield code="a">71665411</subfield><subfield code="a">72763213</subfield><subfield code="a">162597499</subfield><subfield code="a">176042186</subfield><subfield code="a">181421134</subfield><subfield code="a">228145003</subfield><subfield code="a">228145004</subfield><subfield code="a">481918105</subfield><subfield code="a">507575457</subfield><subfield code="a">560260778</subfield><subfield code="a">647580050</subfield><subfield code="a">722510417</subfield><subfield code="a">728025414</subfield><subfield code="a">744603950</subfield><subfield code="a">759522125</subfield><subfield code="a">765142699</subfield><subfield code="a">781250873</subfield><subfield code="a">888768316</subfield><subfield code="a">961515679</subfield><subfield code="a">962712395</subfield><subfield code="a">966203657</subfield><subfield code="a">988492282</subfield><subfield code="a">991937134</subfield><subfield code="a">1035706356</subfield><subfield code="a">1037439064</subfield><subfield code="a">1038403690</subfield><subfield code="a">1044249510</subfield><subfield code="a">1045537158</subfield><subfield code="a">1050128596</subfield><subfield code="a">1056396427</subfield><subfield code="a">1060200214</subfield><subfield code="a">1074330799</subfield><subfield code="a">1081270729</subfield><subfield code="a">1091368874</subfield><subfield code="a">1100905762</subfield><subfield code="a">1103592927</subfield><subfield code="a">1153017429</subfield><subfield code="a">1162580214</subfield><subfield code="a">1179815815</subfield><subfield code="a">1241947661</subfield><subfield code="a">1302262884</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489773</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048977X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423789734</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423789733</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597490764</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490768</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035718</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035714</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035716</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611035710</subfield></datafield><datafield tag="020" ind1="0" ind2=" "><subfield code="a">9781597491259</subfield><subfield code="q">(online)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749125X</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502907689</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70844414</subfield><subfield code="z">(OCoLC)70792038</subfield><subfield code="z">(OCoLC)71520060</subfield><subfield code="z">(OCoLC)71665411</subfield><subfield code="z">(OCoLC)72763213</subfield><subfield code="z">(OCoLC)162597499</subfield><subfield code="z">(OCoLC)176042186</subfield><subfield code="z">(OCoLC)181421134</subfield><subfield code="z">(OCoLC)228145003</subfield><subfield code="z">(OCoLC)228145004</subfield><subfield code="z">(OCoLC)481918105</subfield><subfield code="z">(OCoLC)507575457</subfield><subfield code="z">(OCoLC)560260778</subfield><subfield code="z">(OCoLC)647580050</subfield><subfield code="z">(OCoLC)722510417</subfield><subfield code="z">(OCoLC)728025414</subfield><subfield code="z">(OCoLC)744603950</subfield><subfield code="z">(OCoLC)759522125</subfield><subfield code="z">(OCoLC)765142699</subfield><subfield code="z">(OCoLC)781250873</subfield><subfield code="z">(OCoLC)888768316</subfield><subfield code="z">(OCoLC)961515679</subfield><subfield code="z">(OCoLC)962712395</subfield><subfield code="z">(OCoLC)966203657</subfield><subfield code="z">(OCoLC)988492282</subfield><subfield code="z">(OCoLC)991937134</subfield><subfield code="z">(OCoLC)1035706356</subfield><subfield code="z">(OCoLC)1037439064</subfield><subfield code="z">(OCoLC)1038403690</subfield><subfield code="z">(OCoLC)1044249510</subfield><subfield code="z">(OCoLC)1045537158</subfield><subfield code="z">(OCoLC)1050128596</subfield><subfield code="z">(OCoLC)1056396427</subfield><subfield code="z">(OCoLC)1060200214</subfield><subfield code="z">(OCoLC)1074330799</subfield><subfield code="z">(OCoLC)1081270729</subfield><subfield code="z">(OCoLC)1091368874</subfield><subfield code="z">(OCoLC)1100905762</subfield><subfield code="z">(OCoLC)1103592927</subfield><subfield code="z">(OCoLC)1153017429</subfield><subfield code="z">(OCoLC)1162580214</subfield><subfield code="z">(OCoLC)1179815815</subfield><subfield code="z">(OCoLC)1241947661</subfield><subfield code="z">(OCoLC)1302262884</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000005</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S655 2006</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/068</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001015003</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Syngress IT security project management handbook /</subfield><subfield code="c">Susan Snedaker ; Russ Rogers, technical editor.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">IT security project management handbook</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 612 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">ITpro collection</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Handbooks, manuals, etc.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="x">Handbooks, manuals, etc.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="0"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Handbook</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D020479</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">handbooks.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026109</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Guides et manuels.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004020328</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Syngress IT security project management handbook (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG7w6d3hYKDr9Y9VfjhwkC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Snedaker, Susan.</subfield><subfield code="t">Syngress IT security project management handbook.</subfield><subfield code="d">Rockland, Mass. : Syngress, ©2006</subfield><subfield code="z">1597490768</subfield><subfield code="z">9781597490764</subfield><subfield code="w">(OCoLC)811354027</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">ITpro collection.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490764</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163063</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">syngressitsecuri0000sned</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00014082</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">59.95</subfield><subfield code="d">44.96</subfield><subfield code="i">1597490768</subfield><subfield code="n">0006736970</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Brodart</subfield><subfield code="b">BROD</subfield><subfield code="n">05689589</subfield><subfield code="c">$59.95</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0006935963</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10142560</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">163063</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">103571</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627195</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730639</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2456720</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2439189</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. Handbook https://id.nlm.nih.gov/mesh/D020479 handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf |
genre_facet | Electronic books. Handbook handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
id | ZDB-4-EBA-ocm70844414 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:56Z |
institution | BVB |
isbn | 9780080489773 008048977X 9781423789734 1423789733 1281035718 9781281035714 9786611035716 6611035710 9781597491259 159749125X |
language | English |
oclc_num | 70844414 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvi, 612 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub., |
record_format | marc |
series | ITpro collection. |
series2 | ITpro collection |
spelling | Snedaker, Susan. http://id.loc.gov/authorities/names/n2001015003 Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor. IT security project management handbook Rockland, MA : Syngress Pub., ©2006. 1 online resource (xxvi, 612 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda ITpro collection Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments. English. Computer networks Security measures Handbooks, manuals, etc. Computer security Management Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Gestion Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures Handbooks, manuals, etc. blmlsh Computer security Management Handbooks, manuals, etc. blmlsh Computer networks Security measures fast Computer security Management fast Electronic books. Handbook https://id.nlm.nih.gov/mesh/D020479 handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf Rogers, Russ. http://id.loc.gov/authorities/names/no2004020328 has work: Syngress IT security project management handbook (Text) https://id.oclc.org/worldcat/entity/E39PCG7w6d3hYKDr9Y9VfjhwkC https://id.oclc.org/worldcat/ontology/hasWork Print version: Snedaker, Susan. Syngress IT security project management handbook. Rockland, Mass. : Syngress, ©2006 1597490768 9781597490764 (OCoLC)811354027 ITpro collection. FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490764 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163063 Volltext |
spellingShingle | Snedaker, Susan Syngress IT security project management handbook / ITpro collection. Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. Computer networks Security measures Handbooks, manuals, etc. Computer security Management Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Gestion Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures Handbooks, manuals, etc. blmlsh Computer security Management Handbooks, manuals, etc. blmlsh Computer networks Security measures fast Computer security Management fast |
subject_GND | https://id.nlm.nih.gov/mesh/D020479 http://id.loc.gov/authorities/genreForms/gf2014026109 |
title | Syngress IT security project management handbook / |
title_alt | IT security project management handbook |
title_auth | Syngress IT security project management handbook / |
title_exact_search | Syngress IT security project management handbook / |
title_full | Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor. |
title_fullStr | Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor. |
title_full_unstemmed | Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor. |
title_short | Syngress IT security project management handbook / |
title_sort | syngress it security project management handbook |
topic | Computer networks Security measures Handbooks, manuals, etc. Computer security Management Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Gestion Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures Handbooks, manuals, etc. blmlsh Computer security Management Handbooks, manuals, etc. blmlsh Computer networks Security measures fast Computer security Management fast |
topic_facet | Computer networks Security measures Handbooks, manuals, etc. Computer security Management Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Gestion Guides, manuels, etc. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Management Electronic books. Handbook handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
url | https://www.sciencedirect.com/science/book/9781597490764 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163063 |
work_keys_str_mv | AT snedakersusan syngressitsecurityprojectmanagementhandbook AT rogersruss syngressitsecurityprojectmanagementhandbook AT snedakersusan itsecurityprojectmanagementhandbook AT rogersruss itsecurityprojectmanagementhandbook |