
Syngress IT Security Project Management Handbook
- Publisher's listprice EUR 46.95
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 1 992 Ft off)
- Discounted price 17 924 Ft (17 070 Ft + 5% VAT)
19 916 Ft
Availability
Out of print
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Syngress
- Date of Publication 4 July 2006
- ISBN 9781597490764
- Binding Paperback
- No. of pages pages
- Size 229x178 mm
- Weight 898 g
- Language English 0
Categories
Long description:
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems.
The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.
* The first book devoted exclusively to managing IT security projects
* Expert authors combine superb project management skills with in-depth coverage of highly complex security projects
* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments
Table of Contents:
Identifying Objectives of IT Security Projects
Taking Inventory of Cores Assets
Identifying and Prioritizing Threats
Existing Security Infrastructure
Creating Penetrations Tests
Analyzing Security Logs
Creating Successful IDS
Monitoring Host Servers
Managing Internal Threats
Contingency Planning and Disaster Recovery