Network Security Policies and Procedures
Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization’s security and will thus be better equipped to act in a way that forwards an organization’s goals.

Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.

1101515668
Network Security Policies and Procedures
Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization’s security and will thus be better equipped to act in a way that forwards an organization’s goals.

Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.

159.0 In Stock
Network Security Policies and Procedures

Network Security Policies and Procedures

by Douglas W. Frye
Network Security Policies and Procedures

Network Security Policies and Procedures

by Douglas W. Frye

Paperback(Softcover reprint of hardcover 1st ed. 2007)

$159.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization’s security and will thus be better equipped to act in a way that forwards an organization’s goals.

Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.


Product Details

ISBN-13: 9781441940476
Publisher: Springer US
Publication date: 11/23/2010
Series: Advances in Information Security , #32
Edition description: Softcover reprint of hardcover 1st ed. 2007
Pages: 244
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Information Technology and Its Role in the Modern Organization.- The Extent of an Organization’s Connectivity.- Network Physical Components.- Legitimate Network Access.- Illegitimate Network Access.- Encryption.- Balanced Scorecard.- Sarbanes-Oxley.- Physical Security.- Disaster Recovery.- Initial Employee Communication.- The Human Element.- Email, Instant Messaging and Phishing.- Network Administration.- Network Monitoring.- Executive Communication.- Information Security Awareness.- Synthesis and Conclusion.- Draft Policies.
From the B&N Reads Blog

Customer Reviews