John Vacca is an information technology consultant, researcher, professional writer, Editor, reviewer, and internationally-known best-selling author based in Pomeroy, Ohio. He has written more than articles in the areas of advanced storage, computer security and aerospace technology copies of articles and books are available upon request. In addition, John is also an independent online book reviewer. John can be reached at: john windstream.
Add to cart. Sales tax will be calculated at check-out. Free Global Shipping. Description Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.
It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Security Management Systems Ch 3. Information Technology Security Management Ch 4. Intrusion Prevention and Detection Systems Ch 6. Whitman, Michael E. Management of Information Security. Advanced Search. Skip to main content. Faculty Publications. Title Management of Information Security, 2nd Edition. Authors Michael E. Abstract Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike.
Recommended Citation Whitman, Michael E.
0コメント