Enterprise Security: IT Security Solutions -- Concepts, Practical Experiences, Technologies

Enterprise Security

IT Security Solutions -- Concepts, Practical Experiences, Technologies
 
Publisher: Wiley-Vch
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 29.95
Estimated price in HUF:
14 465 HUF (13 777 HUF + 5% VAT)
Why estimated?
 
Your price:

13 019 (12 399 HUF + 5% VAT )
discount is: 10% (approx 1 447 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

 
 
 
 
 
Product details:

ISBN13:9783895782671
ISBN10:389578267X
Binding:Hardback
No. of pages:264 pages
Size:251x186x17 mm
Weight:542 g
Language:English
0
Category:
Short description:

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.

Long description:
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.

Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided.

The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.



Enterprise Security

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's Corporations and Organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.


Areas covered include information security management (including security certification), network and system security, identify and access management (IAM), and authentication (including smart card based solutions and biometrics). In-depth discussion of relevant technologies and standards (including cryptographic techniques, public key infrastructures, IAM technologies)is provided.


The book features detailed discussions of practical experiences in different sectors.



"Technical readers can get a business case orientation, while managers and consultant?can use it to fill the technical gaps in their understanding." (
Computing Reviews.com, August 22, 2007)

"?an interesting book that contains practical material that will be instructive to novices and experts alike?very useful for security professionals looking to hone and update their skills." (Computing Reviews.com, March 27, 2007)


"?a valuable primer for consultants and non-tech-savvy managers who are seeking to get their minds around security ?" (Blogcritics.org, May 29, 2006)



"?an interesting book that contains practical material that will be instructive to novices and experts alike?very useful for security professionals looking to hone and update their skills." (
Computing Reviews.com, March 27, 2007)

"?a valuable primer for consultants and non-tech-savvy managers who are seeking to get their minds around security ?" (Blogcritics.org, May 29, 2006)

Table of Contents:
PART I: CONCEPTS & TRENDS

Information security management

Network & system security

Smartcard based solutions

Identity & access management

Biometrics

PART II: PRACTICAL EXPERIENCES

Risk management in the financial services industry

IT security in the automotive sector

Smart card applications for hospitals

IT Security for e-Government applications

Role-based access control in a corporation

Corporate badge & PKI for a global player

PART III: TECHNOLOGIES & STANDARDS

Cryptographic techniques

Public key infrastructure

Intelligent tokens

Identity & access management technologies

Process certification

Product certification