000 01629cam a2200313 a 4500
999 _c7009
_d7009
001 16197887
005 20190818114307.0
008 100421s2010 maua b 001 0 eng
010 _a 2010014456
020 _a9781597495332 (papercover : alk. paper)
040 _aDLC
_cDLC
_dDLC
_erda
050 0 0 _aQA76.9.A25
_bM31845 2010
082 0 0 _a005.8
_222
_bV.J.M
245 0 0 _aManaging information security /
_ceditor John R. Vacca.
260 _aBurlington, MA :
_bElsevier,
_c2010.
300 _axxiv, 296 p. :
_bill. ;
_c24 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
504 _aIncludes bibliographical references and index.
505 0 _anformation security essentials for IT managers: protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and James Harmening -- Information technology security management / Rahul Bhasker, Bhushan Kapoor -- Identity management / Jean-Marc Seigneur, Tewfiq El Maliki -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan, Linfeng Zhang -- Firewalls / Errin W. Fulp -- Penetration testing / Jay Bavisi -- What is vulnerability assessment? / Almantas Kakareka.
650 0 _aComputer security
_xManagement.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aPenetration testing (Computer security)
700 1 _avacca , johan R.
_933486
_d1976-
856 _3Abstract
_uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3461
942 _cBK
_2ddc