Details

Network Security Policies and Procedures


Network Security Policies and Procedures


Advances in Information Security, Band 32

von: Douglas W. Frye

96,29 €

Verlag: Springer
Format: PDF
Veröffentl.: 06.04.2007
ISBN/EAN: 9780387479552
Sprache: englisch
Anzahl Seiten: 244

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<P>Company network administrators are compelled today to aggressively pursue a robust network security regime. <STRONG>Network Security Policies and Procedures </STRONG>gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.</P>
<P>This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization’s security and will thus be better equipped to act in a way that forwards an organization’s goals.</P>
<P><STRONG>Network Security Policies and Procedures</STRONG> is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.</P>
Information Technology and Its Role in the Modern Organization.- The Extent of an Organization’s Connectivity.- Network Physical Components.- Legitimate Network Access.- Illegitimate Network Access.- Encryption.- Balanced Scorecard.- Sarbanes-Oxley.- Physical Security.- Disaster Recovery.- Initial Employee Communication.- The Human Element.- Email, Instant Messaging and Phishing.- Network Administration.- Network Monitoring.- Executive Communication.- Information Security Awareness.- Synthesis and Conclusion.- Draft Policies.
<P>Company network administrators are compelled today to aggressively pursue a robust network security regime. <STRONG>Network Security Policies and Procedures</STRONG> aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security, as well as how security policies are formulated at the executive level and communicated throughout the organization.</P>
<P><STRONG>Network Security Policies and Procedures</STRONG> offers an unique mix of technical information and organizational communication concepts. Each chapter includes objectives, introduction, summary and review questions. Readers will gain a better understanding of how their colleagues on <EM>the other side of the fence</EM> view the company’s security, and will thus be better equipped to act in a way that forwards an organization's goals.</P>
<P><STRONG>Network Security Policies and Procedures</STRONG> is designed for practitioners and researchers in industry. This book is also suitable for upper under graduate and graduate-level students in computer science.</P>
<P>&nbsp;</P>
Offers unique mix of technical information and organizational communication concepts Provides initial views on policies in Service Oriented Architectures, the "next big thing" in IT Uses the Balanced Scorecard methodology to illustrate how policies at each level flow up and down through an organization’s governance structure Each chapter includes objectives, introduction, summary, review questions, and exercises Includes supplementary material: sn.pub/extras
<P>Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. The book is also suitable for advanced-level students in computer science and electrical engineering. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view the company’s security and will thus be better equipped to act in a way that forwards the company’s goals.</P>

Diese Produkte könnten Sie auch interessieren:

Spatial Computing: An AI-Driven Business Revolution
Spatial Computing: An AI-Driven Business Revolution
von: Cathy Hackl, Irena Cronin
PDF ebook
20,99 €
Spatial Computing: An AI-Driven Business Revolution
Spatial Computing: An AI-Driven Business Revolution
von: Cathy Hackl, Irena Cronin
EPUB ebook
20,99 €
A Biography of the pixel
A Biography of the pixel
von: Alvy Ray Smith
EPUB ebook
9,99 €