Syngress IT Security Project Management Handbook
Syngress Media,U.S. (Verlag)
978-1-59749-076-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. It provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. This is the first book devoted exclusively to managing IT security projects. Expert authors combine superb project management skills with in-depth coverage of highly complex security projects. By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments.
Susan Snedaker, Principal Consultant and founder of Virtual Team Consulting, LLC has over 20 years' experience working in IT in both technical and executive positions including with Microsoft, Honeywell, and Logical Solutions. Her experience in executive roles at both Keane, Inc. and Apta Software, Inc. provided extensive strategic and operational experience in managing hardware, software and other IT projects involving both small and large teams. As a consultant, she and her team work with companies of all sizes to improve operations, which often entails auditing IT functions and building stronger project management skills, both in the IT department and company-wide. She has developed customized project management training for a number of clients and has taught project management in a variety of settings. Ms. Snedaker holds a Master's degree in Business Administration (MBA) and a Bachelor's degree in Management. She is a Microsoft Certified Systems Engineer (MCSE), a Microsoft Certified Trainer (MCT), and has a certificate in Advanced Project Management from Stanford University.
Identifying Objectives of IT Security Projects Taking Inventory of Cores Assets Identifying and Prioritizing Threats Existing Security Infrastructure Creating Penetrations Tests Analyzing Security Logs Creating Successful IDS Monitoring Host Servers Managing Internal Threats Contingency Planning and Disaster Recovery
Erscheint lt. Verlag | 4.7.2006 |
---|---|
Zusatzinfo | Illustrations, unspecified |
Verlagsort | Rockland, MA |
Sprache | englisch |
Maße | 178 x 229 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 1-59749-076-8 / 1597490768 |
ISBN-13 | 978-1-59749-076-4 / 9781597490764 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich