Information Security: The Complete Reference, Second Edition et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus

Acheter neuf

ou
Identifiez-vous pour activer la commande 1-Click.
Acheter d'occasion
D'occasion - Très bon Voir les détails
Prix : EUR 18,38

ou
 
   
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 17,42
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Information Security: The Complete Reference, Second Edition sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Information Security [Anglais] [Broché]

Mark Rhodes-Ousley

Prix : EUR 54,07 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 6 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le lundi 22 septembre ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 37,85  
Broché EUR 54,07  
Vendez cet article - Prix de rachat jusqu'à EUR 17,42
Vendez Information Security contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 17,42, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.

Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike.

  • Understand security concepts and building blocks
  • Identify vulnerabilities and mitigate risk
  • Optimize authentication and authorization
  • Use IRM and encryption to protect unstructured data
  • Defend storage devices, databases, and software
  • Protect network routers, switches, and firewalls
  • Secure VPN, wireless, VoIP, and PBX infrastructure
  • Design intrusion detection and prevention systems
  • Develop secure Windows, Java, and mobile applications
  • Perform incident response and forensic analysis

Biographie de l'auteur

Mark Rhodes-Ousley has 20 years of experience with every aspect of security, from program management to technology. That experience includes risk management, security policies, security management, technology implementation and operations, physical security, disaster recovery, and business continuity planning. He holds two core beliefs: that business processes are just as important as technology because security relies on people; and that security should be a business enabler with a goal of enhancing the customer experience. Mark is CISSP, CISM, and MCSE certified.


Détails sur le produit


Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 5.0 étoiles sur 5  4 commentaires
5.0 étoiles sur 5 Great overall resource for IT security matters 23 juillet 2014
Par David Kirkman - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
As a business manager with responsibility for IT, I found th oily s book invaluable in understanding many of the issues impacting our information security posture and the processes and technologies affecting them. I recommend this book to anyone who needs to get a comprehensive understanding of the current threats to securing their organization's information.
3 internautes sur 6 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 safes my live 19 juillet 2013
Par pedro - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
Read it. This book helps me to define a security structure to an enterprise at Mexico that nobody knows how to do tjat
5 internautes sur 11 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A note from the author 24 avril 2013
Par Mark Rhodes-Ousley - Publié sur Amazon.com
Format:Broché
The following contributors and peer reviewers provided indispensable thought leadership that greatly improved the quality of this book. I'd like to recognize their contributions and express my gratitude for their work.

- Andrew Abbate, principal consultant and partner at Convergent Computing.
- Barrington Allen, technical expert
- Brian Baker, EMC Storage Specialist
- Zheng Bu, security researcher at McAfee
- Brian Buege, Director of Engineering at Spirent Communications
- Anil Desai, author and independent consultant specializing in Microsoft technologies
- Leo Dregier, principal at the computer security firm The Security Matrix, LLC
- Dr. Nick Efford, senior teaching fellow in the School of Computing at the University of Leeds
- Thaddeus Fortenberry, specializes in complete security plans for remote deployments that address real-world issues and protection
- Christian Genetski, Senior Vice President and General Counsel at the Entertainment Software Association.
- Christine Grayban, Enterprise Security practice lead for Stach & Liu
- Roger A. Grimes, author and consultant
- Gregory Hoban, Senior Systems Engineer
- Michael Howard, Principal CyberSecurity Architect at Microsoft
- Ayush Jain, Senior IT Infrastructure Manager
- Michael Judd, Senior Application Engineer at FTEN
- Dr. Bryan Kissinger, author, security professional, and healthcare and technology sector specialist
- Thomas Knox, Streaming Media Engineer at Comcast
- Brenda Larcom, Senior Security Consultant and cofounder of an open source threat modeling methodology
- Eric Milam, Principal Security Assessor and project steward for the Ettercap project
- Michael T. Raggo, Product Manager at AirDefense
- Eric Reither, Vice President and a Senior Security Consultant at Security by Design Inc.
- Ben Rothke, Corporate Services Information Security Manager at Wyndham Worldwide
- Zeke Rutman-Allen, fanatical technologist and Senior Manager, Global Network Services for a multibillion dollar green energy company
- Stephen Singam, CTO at Hewlett-Packard
- Keith Strassberg, CEO/CTO of Universal Survey
- Simon Thorpe, Microsoft AD RMS technology specialist
- Dr. Andrew A. Vladimirov, Chief Security Manager for Arhont Information Security Ltd.
- Barak Weichselbaum, network and security consultant who started in the Israeli Defense Forces and served in the intelligence corps, and is now founder and CEO of B.W. Komodia Ltd.
- Marcia Wilson, information technology veteran who has focused on information security for the last decade
0 internautes sur 13 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 good 11 décembre 2013
Par penbuyer - Publié sur Amazon.com
Format:Broché|Achat vérifié
Arrived in a timely manner and in good condition. I had to buy this book as part of a masters degree cert program. Didn't really read it but it appears to be a well written book.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?