Book description
This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.
Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure
* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies
* Navigate through jargon filled meetings with this handy aid
* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright page
- Acknowledgments
- Author Acknowledgements
- About the Author
- About Interoute Communications Limited
- About the Technical Editor
- How to Use this Book
- Preface
- Introduction
- Chapter 1: The Security Organization
- Chapter 2: The Information Security Policy
- Chapter 3: Jargon, Principles, and Concepts
- Chapter 4: Information Security Laws and Regulations
- Chapter 5: Information Security Standards and Audits
- Chapter 6: Interviews, Bosses, and Staff
- Chapter 7: Infrastructure Security
- Chapter 8: Firewalls
- Chapter 9: Intrusion Detection Systems: Theory
- Chapter 10: Intrusion Detection Systems: In Practice
- Chapter 11: Intrusion Prevention and Protection
- Chapter 12: Network Penetration Testing
- Chapter 13: Application Security Flaws and Application Testing
- Index
Product information
- Title: How to Cheat at Managing Information Security
- Author(s):
- Release date: August 2006
- Publisher(s): Syngress
- ISBN: 9780080508283
You might also like
book
Strategic Security Management
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security …
book
Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set
The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection …
book
CompTIA® Security+ SY0-501 Cert Guide, Academic Edition, Second Edition
Learn, prepare, and practice for CompTIA Security+ SY0-501 exam success with this full-color CompTIA Authorized Cert …
book
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice …