Sold Out
Book Categories |
Preface | ||
Ch. 1 | Prepare the Enterprise for Security | 1 |
Ch. 2 | Organize Security by Resource and Domains | 31 |
Ch. 3 | Complete the Baseline Security Analysis | 51 |
Ch. 4 | Complete the Requirements | 61 |
Ch. 5 | Identify Gaps and Prioritize Needs | 81 |
Ch. 6 | Selecting and Planning the Projects | 93 |
Ch. 7 | Modifying ESP | 107 |
Ch. 8 | Formulating a Technology Strategy | 113 |
Ch. 9 | Security Technologies | 119 |
Ch. 10 | Two Case Histories | 151 |
Ch. 11 | Security Follow-Up Projects | 169 |
Ch. 12 | Single-Point Administration through Role-based Authorization | 181 |
Ch. 13 | Single Sign-On | 193 |
App. A | Sample Request For Proposal | 209 |
App. B: Further Reading | 221 | |
Glossary | 223 | |
Index | 233 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecuring Business Information: Strategies to Protect the Enterprise and Its Network
X
This Item is in Your InventorySecuring Business Information: Strategies to Protect the Enterprise and Its Network
X
You must be logged in to review the productsX
X
X
Add Securing Business Information: Strategies to Protect the Enterprise and Its Network, Securing Business Information provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo, Securing Business Information: Strategies to Protect the Enterprise and Its Network to the inventory that you are selling on WonderClubX
X
Add Securing Business Information: Strategies to Protect the Enterprise and Its Network, Securing Business Information provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of yo, Securing Business Information: Strategies to Protect the Enterprise and Its Network to your collection on WonderClub |