Information Security: The Complete Reference, Second Edition et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 54,07
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Information Security a été ajouté à votre Panier
Amazon rachète votre
article EUR 12,88 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Information Security (Anglais) Broché – 1 avril 2013

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 54,07
EUR 43,09 EUR 47,94

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.

Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike.

  • Understand security concepts and building blocks
  • Identify vulnerabilities and mitigate risk
  • Optimize authentication and authorization
  • Use IRM and encryption to protect unstructured data
  • Defend storage devices, databases, and software
  • Protect network routers, switches, and firewalls
  • Secure VPN, wireless, VoIP, and PBX infrastructure
  • Design intrusion detection and prevention systems
  • Develop secure Windows, Java, and mobile applications
  • Perform incident response and forensic analysis

Biographie de l'auteur

Mark Rhodes-Ousley has 20 years of experience with every aspect of security, from program management to technology. That experience includes risk management, security policies, security management, technology implementation and operations, physical security, disaster recovery, and business continuity planning. He holds two core beliefs: that business processes are just as important as technology because security relies on people; and that security should be a business enabler with a goal of enhancing the customer experience. Mark is CISSP, CISM, and MCSE certified.

Vendez cet article - Prix de rachat jusqu'à EUR 12,88
Vendez Information Security contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 12,88, que vous pourrez ensuite utiliser sur tout le site Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur (beta) 4 commentaires
Great overall resource for IT security matters 23 juillet 2014
Par David K - Publié sur
Format: Format Kindle Achat vérifié
As a business manager with responsibility for IT, I found th oily s book invaluable in understanding many of the issues impacting our information security posture and the processes and technologies affecting them. I recommend this book to anyone who needs to get a comprehensive understanding of the current threats to securing their organization's information.
3 internautes sur 6 ont trouvé ce commentaire utile 
safes my live 19 juillet 2013
Par pedro - Publié sur
Format: Format Kindle Achat vérifié
Read it. This book helps me to define a security structure to an enterprise at Mexico that nobody knows how to do tjat
6 internautes sur 13 ont trouvé ce commentaire utile 
A note from the author 24 avril 2013
Par Mark Rhodes-Ousley - Publié sur
Format: Broché
The following contributors and peer reviewers provided indispensable thought leadership that greatly improved the quality of this book. I'd like to recognize their contributions and express my gratitude for their work.

- Andrew Abbate, principal consultant and partner at Convergent Computing.
- Barrington Allen, technical expert
- Brian Baker, EMC Storage Specialist
- Zheng Bu, security researcher at McAfee
- Brian Buege, Director of Engineering at Spirent Communications
- Anil Desai, author and independent consultant specializing in Microsoft technologies
- Leo Dregier, principal at the computer security firm The Security Matrix, LLC
- Dr. Nick Efford, senior teaching fellow in the School of Computing at the University of Leeds
- Thaddeus Fortenberry, specializes in complete security plans for remote deployments that address real-world issues and protection
- Christian Genetski, Senior Vice President and General Counsel at the Entertainment Software Association.
- Christine Grayban, Enterprise Security practice lead for Stach & Liu
- Roger A. Grimes, author and consultant
- Gregory Hoban, Senior Systems Engineer
- Michael Howard, Principal CyberSecurity Architect at Microsoft
- Ayush Jain, Senior IT Infrastructure Manager
- Michael Judd, Senior Application Engineer at FTEN
- Dr. Bryan Kissinger, author, security professional, and healthcare and technology sector specialist
- Thomas Knox, Streaming Media Engineer at Comcast
- Brenda Larcom, Senior Security Consultant and cofounder of an open source threat modeling methodology
- Eric Milam, Principal Security Assessor and project steward for the Ettercap project
- Michael T. Raggo, Product Manager at AirDefense
- Eric Reither, Vice President and a Senior Security Consultant at Security by Design Inc.
- Ben Rothke, Corporate Services Information Security Manager at Wyndham Worldwide
- Zeke Rutman-Allen, fanatical technologist and Senior Manager, Global Network Services for a multibillion dollar green energy company
- Stephen Singam, CTO at Hewlett-Packard
- Keith Strassberg, CEO/CTO of Universal Survey
- Simon Thorpe, Microsoft AD RMS technology specialist
- Dr. Andrew A. Vladimirov, Chief Security Manager for Arhont Information Security Ltd.
- Barak Weichselbaum, network and security consultant who started in the Israeli Defense Forces and served in the intelligence corps, and is now founder and CEO of B.W. Komodia Ltd.
- Marcia Wilson, information technology veteran who has focused on information security for the last decade
0 internautes sur 14 ont trouvé ce commentaire utile 
good 11 décembre 2013
Par penbuyer - Publié sur
Format: Broché Achat vérifié
Arrived in a timely manner and in good condition. I had to buy this book as part of a masters degree cert program. Didn't really read it but it appears to be a well written book.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?