LEADER 03075nam 2200637Ia 450 001 9910827388403321 005 20200520144314.0 010 $a1-281-03571-8 010 $a9786611035716 010 $a0-08-048977-X 010 $a1-59749-125-X 035 $a(CKB)1000000000298108 035 $a(EBL)261283 035 $a(OCoLC)181421134 035 $a(SSID)ssj0000078257 035 $a(PQKBManifestationID)11110304 035 $a(PQKBTitleCode)TC0000078257 035 $a(PQKBWorkID)10061227 035 $a(PQKB)10621169 035 $a(Au-PeEL)EBL261283 035 $a(CaPaEBR)ebr10142560 035 $a(CaONFJC)MIL103571 035 $a(OCoLC)815528831 035 $a(CaSebORM)1597490768 035 $a(MiAaPQ)EBC261283 035 $a(OCoLC)ocm71665411 035 $a(EXLCZ)991000000000298108 100 $a20060807d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSyngress IT security project management handbook /$fSusan Snedaker ; Russ Rogers, technical editor 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing$dc2006 215 $a1 online resource (642 p.) 300 $aIncludes index. 311 $a1-59749-076-8 327 $aCh. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. 330 $aThe definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the hig 517 3 $aIT security project management handbook 606 $aComputer networks$xSecurity measures$vHandbooks, manuals, etc 606 $aComputer security$xManagement$vHandbooks, manuals, etc 615 0$aComputer networks$xSecurity measures 615 0$aComputer security$xManagement 676 $a005.8 700 $aSnedaker$b Susan$0627555 701 $aRogers$b Russ$0627573 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827388403321 996 $aSyngress IT security project management handbook$93975911 997 $aUNINA