01057cam0 2200289 450 E60020006089920210414125339.0881695080320100303d1991 |||||ita|0103 baitaITDalla storia all'epistemologiaLo storicismo scientificoPrincipi di una teoria della storicizzazioneLuigi Zanzipref. Ludovico GeymonatMilanoJaca Book1991VI, 486 p.23 cmEdizioni universitarie Jaca80001LAEC000154632001 *Edizioni universitarie Jaca80Zanzi, LuigiA600200060185070150713Geymonat, LudovicoAF00005939070ITUNISOB20210414RICAUNISOBUNISOB10069462E600200060899M 102 Monografia moderna SBNM100007366Si69462acquistopregresso1UNISOBUNISOB20100303085340.020210414125327.0AlfanoDalla storia all'epistemologia193281UNISOB03178cam a2200409Ii 4500991003251199707536m d cr cn|||||||||070806s2006 maua sf 001 0 eng d97815974907641597490768b13655632-39ule_inst133687:133812Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSOPELSTEFA005.822Snedaker, Susan.627555Syngress IT security project management handbook[electronic resource] /Susan Snedaker ; Russ Rogers, technical editor.IT security project management handbookRockland, MA :Syngress,c2006.xxvi, 612 p. :ill. ;23 cm.Includes index.Identifying Objectives of IT Security Projects -- Taking Inventory of Cores Assets -- Identifying and Prioritizing Threats -- Existing Security Infrastructure -- Creating Penetrations Tests -- Analyzing Security Logs -- Creating Successful IDS -- Monitoring Host Servers -- Managing Internal Threats -- Contingency Planning and Disaster Recovery.The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer networksSecurity measuresHandbooks, manuals, etc.Computer securityManagementHandbooks, manuals, etc.Electronic books.localRogers, Russ.Original15974907689781597490764(OCoLC)72763213Referexhttp://www.sciencedirect.com/science/book/9781597490764An electronic book accessible through the World Wide Web; click for information.b1365563224-02-2224-01-08991003251199707536C0TEFSyngress IT security project management handbook1213092UNISALENTOle02924-01-08mm -engmau00