Wonder Club world wonders pyramid logo
×

The Secured Enterprise : Protecting Your Information Assets Book

The Secured Enterprise : Protecting Your Information Assets
Be the First to Review this Item at Wonderclub
X
The Secured Enterprise : Protecting Your Information Assets, Securing your key digital and information assets in an age of insecurity. Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberter, The Secured Enterprise : Protecting Your Information Assets
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • The Secured Enterprise : Protecting Your Information Assets
  • Written by author Paul Proctor, Christina Byrnes
  • Published by Prentice Hall, 2002/02/28
  • Securing your key digital and information assets in an age of insecurity. Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberter
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Foreword
Acknowledgments
Introduction: How to Read This Book
Pt. 1 Introduction to Security 1
1 Introduction to Security 3
2 Threat Briefing 23
3 Security Policies 39
4 Authentication, Authorization, Access Control 53
Pt. 2 Security Technologies 67
5 Firewalls 69
6 Vulnerability Scanners 89
7 Virus Detection and Content Filters 105
8 Intrusion Detection 123
9 Public Key Infrastructure and Encryption 141
10 Encrypted Communications 155
11 Mobile Workers and Wireless LANs 167
12 Single Signon 181
13 Digital Signatures and Electronic Commerce 189
Pt. 3 Implementation 203
14 Establishing a Security Program 205
15 Security Assessments 213
16 Managed Security Services 227
17 Response and Recovery 237
18 Implementing Web and Internet Security 245
Pt. 4 Odds and Ends 259
19 Legal Issues 261
20 Putting It All Together 281
Glossary 287
Index 293


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

The Secured Enterprise : Protecting Your Information Assets, Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberter, The Secured Enterprise : Protecting Your Information Assets

X
WonderClub Home

This item is in your Collection

The Secured Enterprise : Protecting Your Information Assets, Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberter, The Secured Enterprise : Protecting Your Information Assets

The Secured Enterprise : Protecting Your Information Assets

X
WonderClub Home

This Item is in Your Inventory

The Secured Enterprise : Protecting Your Information Assets, Securing your key digital and information assets in an age of insecurity.

Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberter, The Secured Enterprise : Protecting Your Information Assets

The Secured Enterprise : Protecting Your Information Assets

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: