ISBN13: | 9783895782671 |
ISBN10: | 389578267X |
Binding: | Hardback |
No. of pages: | 264 pages |
Size: | 251x186x17 mm |
Weight: | 542 g |
Language: | English |
0 |
Enterprise Security
GBP 29.95
Click here to subscribe.
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.
Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided.
The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.
Enterprise Security
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's Corporations and Organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.
Areas covered include information security management (including security certification), network and system security, identify and access management (IAM), and authentication (including smart card based solutions and biometrics). In-depth discussion of relevant technologies and standards (including cryptographic techniques, public key infrastructures, IAM technologies)is provided.
The book features detailed discussions of practical experiences in different sectors.
"Technical readers can get a business case orientation, while managers and consultant?can use it to fill the technical gaps in their understanding." (
Computing Reviews.com, August 22, 2007)
"?an interesting book that contains practical material that will be instructive to novices and experts alike?very useful for security professionals looking to hone and update their skills." (Computing Reviews.com, March 27, 2007)
"?a valuable primer for consultants and non-tech-savvy managers who are seeking to get their minds around security ?" (Blogcritics.org, May 29, 2006)
"?an interesting book that contains practical material that will be instructive to novices and experts alike?very useful for security professionals looking to hone and update their skills." (
Computing Reviews.com, March 27, 2007)
"?a valuable primer for consultants and non-tech-savvy managers who are seeking to get their minds around security ?" (Blogcritics.org, May 29, 2006)
Information security management
Network & system security
Smartcard based solutions
Identity & access management
Biometrics
PART II: PRACTICAL EXPERIENCES
Risk management in the financial services industry
IT security in the automotive sector
Smart card applications for hospitals
IT Security for e-Government applications
Role-based access control in a corporation
Corporate badge & PKI for a global player
PART III: TECHNOLOGIES & STANDARDS
Cryptographic techniques
Public key infrastructure
Intelligent tokens
Identity & access management technologies
Process certification
Product certification