• Complain

John R. Vacca - Managing Information Security, Second Edition

Here you can read online John R. Vacca - Managing Information Security, Second Edition full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2013, publisher: Syngress, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Managing Information Security, Second Edition
  • Author:
  • Publisher:
    Syngress
  • Genre:
  • Year:
    2013
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Managing Information Security, Second Edition: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Managing Information Security, Second Edition" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise.

  • Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else
  • Comprehensive coverage by leading experts allows the reader to put current technologies to work
  • Presents methods of analysis and problem solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions

John R. Vacca: author's other books


Who wrote Managing Information Security, Second Edition? Find out the surname, the name of the author of the book and a list of all author's works by series.

Managing Information Security, Second Edition — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Managing Information Security, Second Edition" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Managing Information Security Second Edition Edited by John R Vacca Table - photo 1
Managing Information Security

Second Edition

Edited by

John R. Vacca

Table of Contents Copyright Publisher Steven Elliot Senior Developmental - photo 2

Table of Contents
Copyright

Publisher: Steven Elliot

Senior Developmental Editor: Nathaniel McFadden

Editorial Project Manager: Lindsay Lawrence

Project Manager: Mohanambal Natarajan

Designer: Matthew Limbert

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

Second edition 2014

Copyright 2014, 2009 Elsevier Inc. All rights reserved

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elseviers Science & Technology Rights Department in Oxford, UK: phone (+44) (0) 1865 843830; fax (+44) (0) 1865 853333; email: , and selecting Obtaining permission to use Elsevier material

Notice

No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. Because of rapid advances in the medical sciences, in particular, independent verification of diagnoses and drug dosages should be made

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress

British Library Cataloguing in Publication Data

A catalogue record for this book is available from the British Library

For information on all Syngress publications, visit our website at store.elsevier.com/Syngress

ISBN: 978-0-12-416688-2

Printed and bound in USA

14 15 16 17 18 10 9 8 7 6 5 4 3 2 1

Dedication This book is dedicated to my wife Bee Acknowledgements There are - photo 3

Dedication

This book is dedicated to my wife Bee.

Acknowledgements

There are many people whose efforts on this book have contributed to its successful completion. I owe each a debt of gratitude and want to take this opportunity to offer my sincere thanks.

A very special thanks to my publisher, Steve Elliot, without whose continued interest and support this book would not have been possible. Senior development editor Nate McFadden provided staunch support and encouragement when it was most needed. Thanks to my production project manager, Mohanambal Natarajan, whose fine work and attention to detail has been invaluable. Thanks also to my marketing manager, Todd Conly, whose efforts on this book have been greatly appreciated. Finally, thanks to all the other people at Morgan Kaufmann Publishers/Elsevier Science & Technology Books, whose many talents and skills are essential to a finished book.

Thanks to my wife, Bee Vacca, for her love, her help, and her understanding of my long work hours. Finally, I wish to thank all the following authors who contributed chapters that were necessary for the completion of this book: Sanjay Bavisi, Rahul Bhaskar, Albert Caballero, Christopher Day, Scott R. Ellis, Errin W. Fulp, Yong Guan, Cem Gurkok, James T. Harmening, Almantas Kakareka, Bhushan Kapoor, Jean-Marc Seigneur.

About the Editor

John Vacca is an information technology consultant, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, John has authored 73 books (some of his most recent books include):

Computer and Information Security Handbook, 2E (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (May 31, 2013))

Identity Theft (Cybersafety) (Publisher: Chelsea House Pub (April 1, 2012)

System Forensics, Investigation, And Response (Publisher: Jones & Bartlett Learning (September 24, 2010)

Managing Information Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010))

Network and Systems Security (Publisher: Syngress (an imprint of Elsevier Inc.) (March 29, 2010))

Computer and Information Security Handbook, 1E (Publisher: Morgan Kaufmann (an imprint of Elsevier Inc.) (June 2, 2009))

Biometric Technologies and Verification Systems (Publisher: Elsevier Science & Technology Books (March 16, 2007))

Practical Internet Security (Hardcover): (Publisher: Springer (October 18, 2006))

Optical Networking Best Practices Handbook (Hardcover): (Publisher: Wiley-Interscience (November 28, 2006))

Guide to Wireless Network Security (Publisher: Springer (August 19, 2006)

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM), 2nd Edition (Publisher: Charles River Media (May 26, 2005)

and, more than 600 articles in the areas of advanced storage, computer security and aerospace technology (copies of articles and books are available upon request). John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASAs space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995. In addition, John is also an .

Contributors

Sanjay Bavisi

)

President, EC-Council, Selangor, Malaysia

Rahul Bhaskar

)

Professor, Department of Information Systems and Decision Sciences, California State University, Fullerton, CA 92834

Albert Caballero, CISSP, GSEC

)

Chief Technology Officer_CTO, Digital Era Group, LLC, Surfside, Fl. 33154

Christopher Day, CISSP, NSA:IEM

)

Senior Vice President, Secure Information Systems, Terremark Worldwide, Inc., 2 South Biscayne Blvd., Suite 2900, Miami, FL 33131

Scott R. Ellis, EnCE, RCA

)

Manager, Infrastructure Engineering Team,kCura, Chicago, IL 60604

Errin W. Fulp

)

Professor, Department of Computer Science, Wake Forest University, Winston-Salem, North Carolina 27109

Yong Guan

)

Litton Assistant Professor, Department of Electrical and Computer Engineering, Iowa State University, Ames, Iowa 50011

Cem Gurkok

)

Threat Intelligence Development Manager, Terremark, Worldwide, Inc., Miami, Florida 33131

James T. Harmening

)

President, Computer Bits, Inc., Chicago, Illinois 60602

Almantas Kakareka, CISSP, GSNA, GSEC, CEH

)

CTO, Demyo, Inc., Sunny Isles Beach, Florida 33160

Bhushan Kapoor

)

Chair, Department of Information Systems and Decision Sciences, California State University, Fullerton, CA 92834

Jean-Marc Seigneur

)

Advanced Systems Group, University of Geneva, Switzerland

Introduction

John R. Vacca

Editor-in-Chief

This Managing Information Security derivative book provides a broad overview of information security program elements to assist practitioners and IT professionals in enhancing their skills and knowledge on how to establish and implement an information security program. The material in this book can be referenced for general information on a particular topic or can be used in the decision-making process for managing an information security program. The purpose of this book is to inform information security management practitioners and IT professionals about various aspects of information security that they will be expected to implement and oversee in their respective organizations. In addition, the book provides guidance for facilitating a more consistent approach to information security programs.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Managing Information Security, Second Edition»

Look at similar books to Managing Information Security, Second Edition. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Managing Information Security, Second Edition»

Discussion, reviews of the book Managing Information Security, Second Edition and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.