Security Architecture: Design, Deployment and Operations - Christopher King, Curtis Dalton, T. Ertem Osmanoglu

Security Architecture: Design, Deployment and Operations

Buch | Softcover
512 Seiten
2001
McGraw-Hill Professional (Verlag)
978-0-07-213385-1 (ISBN)
46,10 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Will more than 1.3 trillion dollars expected to be spent via e-business on the Internet by 2003, security has never been more important. This title offers a practical, step-by-step approach, and shows how to design and deploy security sucessfully across the enterprise.
New from the official RSA Press, this expert resource explains how to design and deploy security successfully across your enterprise--and keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems, plus real-world case studies.

Christopher King CISSP (Andover, MA) (Certified Information Systems Security Professional) is the Managing Principal of Greenwich Technology Partners. He has over 15 years of experience with various corporations such as Bell Atlantic, McGraw-Hill and Fidelity Investments as an Information Security consultant. Prior to joining Greenwich Technology Partners he served as a Cryptographic Engineer with The National Security Agency. He's a regular contributor to Information Security Magazine, Business Communication Review and Computer Security Review. Curtis Dalton (Georgetown, MA) CISSP, CCIE is a Consulting Engineer with Greenwich Technology Partners. He has over 12 years experience with companies such as Siemens Information and Communications Networks, Boston Technology Corp and Xerox designing and deploying large-scale network solutions in industries ranging from finance to telecommunications, manufacturing, and R&D. Ertam Osmanoglu (Malden, MA) is a Security Engineer with Greenwich Technology Partners. He has over over 5 years experience providing systems and security consulting and support services for Ernst and Young.

Chapter 1: Business and Application Drivers (Case Study) Chapter 2: Security Polices, Standards, and Guidelines Chapter 3: Information Classification and Access Control Plan Chapter 4: Applying the Policies to Derive the Requirements Chapter 5: Security Infrastructure Design Principles Chapter 6: Network Partitioning Chapter 7: Virtual Private Networks Chapter 8: Wireless Security Chapter 9: Platform Hardening Chapter 10: Intrusion Detection Systems Chapter 11: Application Security Chapter 12: PKI: Components and Applications Chapter 13: Security Event Management and Consolidation Chapter 14: Security Management Chapter 15: Validation and Maturity

Erscheint lt. Verlag 16.8.2001
Zusatzinfo 200ill.
Sprache englisch
Maße 191 x 234 mm
Gewicht 1003 g
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 0-07-213385-6 / 0072133856
ISBN-13 978-0-07-213385-1 / 9780072133851
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich