close
Managing Information Security | Zookal Textbooks | Zookal Textbooks
  • Author(s) John R. Vacca
  • Edition2
  • PublishedAugust 2013
  • PublisherElsevier S & T
  • ISBN9780124166882

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.



  • Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else
  • Comprehensive coverage by leading experts allows the reader to put current technologies to work
  • Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions

Managing Information Security

Format
Get it instantly

Zookal account needed

$58.95
Add Zookal Study FREE trial and save a further 10% 

NEW PRICE

$53.06 + free shipping

(10% off - save $5.90)

Zookal Study Free trial

14-day FREE trial. $14.95/mo after. Cancel anytime.

*Discount will apply at checkout.

 See terms and conditions

You will get a further 10% off for this item ($53.06 after discount) because you have added Zookal Study Premium Free Trial to your bag.

For this discount to apply, you will need to complete checkout with the Zookal Study Premium Free Trial in your bag.

-
+
  • Author(s) John R. Vacca
  • Edition2
  • PublishedAugust 2013
  • PublisherElsevier S & T
  • ISBN9780124166882

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.



  • Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else
  • Comprehensive coverage by leading experts allows the reader to put current technologies to work
  • Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions
translation missing: en.general.search.loading