000 03279cam a22004577i 4500
999 _c9834
_d9834
001 18250193
005 20210427122420.0
008 140801t20142014mau b 001 0 eng d
010 _a 2014412845
016 7 _a016471912
_2Uk
020 _a9780124166882
020 _a0124166881 (pbk.)
035 _a(OCoLC)ocn866626513
040 _aREB
_beng
_erda
_cREB
_dOCLCO
_dUKMGB
_dCAUOI
_dDLC
042 _alccopycat
050 0 0 _aQA76.9.A25
_bM31845 2014
082 0 4 _a005.8
_223
_bM
245 0 0 _aManaging information security /
_cedited by John R. Vacca.
250 _aSecond edition.
264 1 _aWaltham, MA :
_bSyngress,
_c[2014]
264 4 _c©2014
300 _axxiv, 347 pages ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _aComputer bookfair 2015.
500 _aPrevious edition: 2010.
504 _aIncludes bibliographical references and index.
505 0 _a1. Information security essentials for IT managers / Albert Caballero -- 2. Security management systems / James T. Harmening -- 3. Information technology security management / Rahul Bhaskar and Bhushan Kapoor -- 4. Online identity and user management services / Tewfiq el Maliki and Jean-Marc Seigneur -- 5. Intrusion prevention and detection systems / Christopher Day -- 6. Firewalls / Dr. Errin W. Fulp -- 7. Penetration testing / Sanjay Bavisi -- 8. What is vulnerability assessment? / Almantas Kakareka -- 9. Cyber forensics / Scott R. Ellis -- 10. Cyber forensics and incident response / Cem Gurkok -- 11. Network forensics / Yong Guan.
520 3 _a"Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else. Comprehensive coverage by leading experts allows the reader to put current technologies to work. Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions". -- Cover.
650 0 _aComputer security
_xManagement.
650 0 _aElectronic data processing departments
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aPenetration testing (Computer security)
700 1 _avacca , johan R.
_eeditor.
_933486
_d1976-
856 _3Abstract
_uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3637
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK