Sold Out
Book Categories |
Foreword | ||
Acknowledgments | ||
Introduction: How to Read This Book | ||
Pt. 1 | Introduction to Security | 1 |
1 | Introduction to Security | 3 |
2 | Threat Briefing | 23 |
3 | Security Policies | 39 |
4 | Authentication, Authorization, Access Control | 53 |
Pt. 2 | Security Technologies | 67 |
5 | Firewalls | 69 |
6 | Vulnerability Scanners | 89 |
7 | Virus Detection and Content Filters | 105 |
8 | Intrusion Detection | 123 |
9 | Public Key Infrastructure and Encryption | 141 |
10 | Encrypted Communications | 155 |
11 | Mobile Workers and Wireless LANs | 167 |
12 | Single Signon | 181 |
13 | Digital Signatures and Electronic Commerce | 189 |
Pt. 3 | Implementation | 203 |
14 | Establishing a Security Program | 205 |
15 | Security Assessments | 213 |
16 | Managed Security Services | 227 |
17 | Response and Recovery | 237 |
18 | Implementing Web and Internet Security | 245 |
Pt. 4 | Odds and Ends | 259 |
19 | Legal Issues | 261 |
20 | Putting It All Together | 281 |
Glossary | 287 | |
Index | 293 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionThe Secured Enterprise : Protecting Your Information Assets
X
This Item is in Your InventoryThe Secured Enterprise : Protecting Your Information Assets
X
You must be logged in to review the productsX
X
X
Add The Secured Enterprise : Protecting Your Information Assets, Securing your key digital and information assets in an age of insecurity. Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberter, The Secured Enterprise : Protecting Your Information Assets to the inventory that you are selling on WonderClubX
X
Add The Secured Enterprise : Protecting Your Information Assets, Securing your key digital and information assets in an age of insecurity. Securing enterprise data, applications, and intellectual property has become THE criticalissue for business decision-makers in this era of hackers and potential cyberter, The Secured Enterprise : Protecting Your Information Assets to your collection on WonderClub |