Wonder Club world wonders pyramid logo
×

Securing Business Information: Strategies to Protect the Enterprise and Its Network Book

Securing Business Information: Strategies to Protect the Enterprise and Its Network
Securing Business Information: Strategies to Protect the Enterprise and Its Network, <i>Securing Business Information</i> provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo, Securing Business Information: Strategies to Protect the Enterprise and Its Network has a rating of 3.5 stars
   2 Ratings
X
Securing Business Information: Strategies to Protect the Enterprise and Its Network, Securing Business Information provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo, Securing Business Information: Strategies to Protect the Enterprise and Its Network
3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Securing Business Information: Strategies to Protect the Enterprise and Its Network
  • Written by author F. Christian Byrnes
  • Published by Pearson Education, January 2002
  • Securing Business Information provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo
  • Two IT consultants from the META Group describe their approach to business information security. The Enterprise Security Plan (ESP) is a six-step process for securing the computing infrastructure within the constraints of normal business operations. Cover
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface
Ch. 1Prepare the Enterprise for Security1
Ch. 2Organize Security by Resource and Domains31
Ch. 3Complete the Baseline Security Analysis51
Ch. 4Complete the Requirements61
Ch. 5Identify Gaps and Prioritize Needs81
Ch. 6Selecting and Planning the Projects93
Ch. 7Modifying ESP107
Ch. 8Formulating a Technology Strategy113
Ch. 9Security Technologies119
Ch. 10Two Case Histories151
Ch. 11Security Follow-Up Projects169
Ch. 12Single-Point Administration through Role-based Authorization181
Ch. 13Single Sign-On193
App. ASample Request For Proposal209
App. B: Further Reading221
Glossary223
Index233


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Securing Business Information: Strategies to Protect the Enterprise and Its Network, <i>Securing Business Information</i> provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo, Securing Business Information: Strategies to Protect the Enterprise and Its Network

X
WonderClub Home

This item is in your Collection

Securing Business Information: Strategies to Protect the Enterprise and Its Network, <i>Securing Business Information</i> provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo, Securing Business Information: Strategies to Protect the Enterprise and Its Network

Securing Business Information: Strategies to Protect the Enterprise and Its Network

X
WonderClub Home

This Item is in Your Inventory

Securing Business Information: Strategies to Protect the Enterprise and Its Network, <i>Securing Business Information</i> provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo, Securing Business Information: Strategies to Protect the Enterprise and Its Network

Securing Business Information: Strategies to Protect the Enterprise and Its Network

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: