Sold Out
Book Categories |
Table of Contents v
List of Figures vii
Preface ix
Acknowledgments and Dedication xi
Information Technology and its Role In the Modern Organization 1
The Extent of an Organization's Connectivity 11
Network Physical Components 27
Legitimate Network Access 35
Illegitimate Network Access 39
Encryption 45
Balanced Scorecard 49
Sarbanes-Oxley 57
Physical Security 69
Disaster Recovery 89
Initial Employee Communication 103
The Human Element 117
Email, Instant Messaging and Phishing 131
Network Administration 153
Network Monitoring 159
Executive Communication 163
Information Security Awareness 179
Synthesis and Conclusion 195
Draft Policies 209
Bibliography 225
Index 237
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionNetwork Security Policies and Procedures
X
This Item is in Your InventoryNetwork Security Policies and Procedures
X
You must be logged in to review the productsX
X
X
Add Network Security Policies and Procedures, Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This profes, Network Security Policies and Procedures to the inventory that you are selling on WonderClubX
X
Add Network Security Policies and Procedures, Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This profes, Network Security Policies and Procedures to your collection on WonderClub |