| 000 | 01995cam a2200253 a 4500 | ||
|---|---|---|---|
| 008 | 120627s2010 maua b 001 0 eng | ||
| 010 | _a2010014456 | ||
| 020 | _a9781597495332 | ||
| 035 | _a(Sirsi) u8297 | ||
| 040 |
_aEG-CaNU _c EG-CaNU _d EG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 0 |
_a005.8 _2 22 |
| 245 | 0 | 0 |
_aManaging information security / _c editor John R. Vacca. |
| 260 |
_aBurlington, MA : _b Elsevier, _c 2010. |
||
| 300 |
_axxiv, 296 p. : _b ill. ; _c 24 cm. |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aInformation security essentials for IT managers: protecting mission-critical systems / Albert Caballero -- Security management systems / Joe Wright and James Harmening -- Information technology security management / Rahul Bhasker, Bhushan Kapoor -- Identity management / Jean-Marc Seigneur, Tewfiq El Maliki -- Intrusion prevention and detection systems / Christopher Day -- Computer forensics / Scott R. Ellis -- Network forensics / Yong Guan, Linfeng Zhang -- Firewalls / Errin W. Fulp -- Penetration testing / Jay Bavisi -- What is vulnerability assessment? / Almantas Kakareka. | |
| 520 | _aManaging Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors’ respective areas of expertise. | ||
| 650 | 0 |
_aComputer security _x Management. _915241 |
|
| 650 | 0 |
_aComputer networks _x Security measures. _915242 |
|
| 650 | 0 |
_aPenetration testing (Computer security) _915243 |
|
| 700 | 1 |
_aVacca, John R. _915244 |
|
| 596 | _a1 | ||
| 999 |
_c7195 _d7195 |
||