𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Network Security Policies and Procedures

✍ Scribed by Douglas W. Frye


Publisher
Springer
Year
2007
Tongue
English
Leaves
174
Series
Advances in information security
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on ''the other side of the fence'' view an organizationΠ²Π‚β„’s security and will thus be better equipped to act in a way that forwards an organizationΠ²Π‚β„’s goals.

Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.


πŸ“œ SIMILAR VOLUMES


Network Security Policies and Procedures
✍ Douglas W. Frye (auth.) πŸ“‚ Library πŸ“… 2007 πŸ› Springer US 🌐 English

<p><P>Company network administrators are compelled today to aggressively pursue a robust network security regime. <STRONG>Network Security Policies and Procedures</STRONG> aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduc

Network Security Policies and Procedures
✍ Douglas W. Frye πŸ“‚ Library πŸ› Springer 🌐 English

Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well a

Policies & Procedures for Data Security:
✍ Thomas Peltier (Author) πŸ“‚ Library πŸ“… 1991 πŸ› CRC Press

<p>Hereβ€˜s your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents.</p><br/><br/><p>Youβ€˜l

Library Security and Safety Handbook: Pr
✍ Bruce A. Shuman πŸ“‚ Library πŸ“… 1999 πŸ› American Library Association 🌐 English

Libraries have long been viewed as safe refuge from the stresses of work, school, even home. But as times have changed, so have the realities of library security. Today, libraries of all types and sizes have fallen victim to the threat of serious crime. Because the risk to both staff and patron alik

Information Security Policies and Proced
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 1998 πŸ› Auerbach Publications 🌐 English

It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers i

Information Security Policies and Proced
✍ Thomas R. Peltier πŸ“‚ Library πŸ“… 1998 πŸ› Auerbach Publications 🌐 English

It explains how why and how to integrate security policies and procedures across all tiers of software engineering organization. I had limited understanding f and this book helped me to get deep in to details and understand at an organization level. I recommend this for all engineers and managers in