Network Security Policies and Procedures

Author:   Douglas W. Frye
Publisher:   Springer-Verlag New York Inc.
Edition:   2007 ed.
Volume:   32
ISBN:  

9780387309378


Pages:   244
Publication Date:   11 December 2006
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $366.96 Quantity:  
Add to Cart

Share |

Network Security Policies and Procedures


Add your own review!

Overview

"Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on ""the other side of the fence"" view an organization’s security and will thus be better equipped to act in a way that forwards an organization’s goals. Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering."

Full Product Details

Author:   Douglas W. Frye
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2007 ed.
Volume:   32
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.50cm
Weight:   1.190kg
ISBN:  

9780387309378


ISBN 10:   0387309373
Pages:   244
Publication Date:   11 December 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Information Technology and Its Role in the Modern Organization.- The Extent of an Organization’s Connectivity.- Network Physical Components.- Legitimate Network Access.- Illegitimate Network Access.- Encryption.- Balanced Scorecard.- Sarbanes-Oxley.- Physical Security.- Disaster Recovery.- Initial Employee Communication.- The Human Element.- Email, Instant Messaging and Phishing.- Network Administration.- Network Monitoring.- Executive Communication.- Information Security Awareness.- Synthesis and Conclusion.- Draft Policies.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List