×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Enterprise Security: IT Security Solutions: Concepts, Practical Experiences, Technologies / Edition 1
     

Enterprise Security: IT Security Solutions: Concepts, Practical Experiences, Technologies / Edition 1

by Walter Fumy, Jorg Sauerbrey
 

ISBN-10: 389578267X

ISBN-13: 9783895782671

Pub. Date: 03/10/2006

Publisher: Wiley

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.
Areas covered include information security management,

Overview

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.
Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided.
The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.

Product Details

ISBN-13:
9783895782671
Publisher:
Wiley
Publication date:
03/10/2006
Pages:
264
Product dimensions:
6.88(w) x 9.90(h) x 0.61(d)

Table of Contents

PART I: CONCEPTS & TRENDS
Information security management
Network & system security
Smartcard based solutions
Identity & access management
Biometrics
PART II: PRACTICAL EXPERIENCES
Risk management in the financial services industry
IT security in the automotive sector
Smart card applications for hospitals
IT Security for e-Government applications
Role-based access control in a corporation
Corporate badge & PKI for a global player
PART III: TECHNOLOGIES & STANDARDS
Cryptographic techniques
Public key infrastructure
Intelligent tokens
Identity & access management technologies
Process certification
Product certification

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews