Skip to Content
Information Security Management Handbook, Volume 5, 6th Edition
book

Information Security Management Handbook, Volume 5, 6th Edition

by Micki Krause Nozaki, Harold F. Tipton
April 2016
Intermediate to advanced
558 pages
19h 52m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 5, 6th Edition
504 ◾  Information Security Management Handbook
link speeds, but, conversely, provisioning a high level of bandwidth on a link is also not a replace-
ment for properly configuring QoS on the network. When balanced in concert, these elements of
networking work well together to provide optimal performance while not wasting bandwidth or
network resources.
Segment Summary
Sensing and actuation, physical access control, and video surveillance/analysis are key technologies
among many available and developing solutions for providing perimeter intrusion detection for
security professionals and their respective teams. It can also be shown that when we leverage the
reach and robustness of IP-based networks to aid in the integration of disparate system ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 7, 6th Edition

Information Security Management Handbook, Volume 7, 6th Edition

Richard O'Hanley, James S. Tiller
Physical Security and Safety

Physical Security and Safety

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

Publisher Resources

ISBN: 9781439853467