Enterprise Security

IT Security Solutions -- Concepts, Practical Experiences, Technologies
 
Kiadó: Wiley-Vch
Megjelenés dátuma:
 
Normál ár:

Kiadói listaár:
GBP 29.95
Becsült forint ár:
14 465 Ft (13 777 Ft + 5% áfa)
Miért becsült?
 
Az Ön ára:

13 019 (12 399 Ft + 5% áfa )
Kedvezmény(ek): 10% (kb. 1 447 Ft)
A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
Kattintson ide a feliratkozáshoz
 
Beszerezhetőség:

A kiadónál véglegesen elfogyott, nem rendelhető. Érdemes újra keresni a címmel, hátha van újabb kiadás.
Nem tudnak pontosabbat?
 
 
Rövid leírás:

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.

Hosszú leírás:
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.

Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided.

The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.



Enterprise Security

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's Corporations and Organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.


Areas covered include information security management (including security certification), network and system security, identify and access management (IAM), and authentication (including smart card based solutions and biometrics). In-depth discussion of relevant technologies and standards (including cryptographic techniques, public key infrastructures, IAM technologies)is provided.


The book features detailed discussions of practical experiences in different sectors.



"Technical readers can get a business case orientation, while managers and consultant?can use it to fill the technical gaps in their understanding." (
Computing Reviews.com, August 22, 2007)

"?an interesting book that contains practical material that will be instructive to novices and experts alike?very useful for security professionals looking to hone and update their skills." (Computing Reviews.com, March 27, 2007)


"?a valuable primer for consultants and non-tech-savvy managers who are seeking to get their minds around security ?" (Blogcritics.org, May 29, 2006)



"?an interesting book that contains practical material that will be instructive to novices and experts alike?very useful for security professionals looking to hone and update their skills." (
Computing Reviews.com, March 27, 2007)

"?a valuable primer for consultants and non-tech-savvy managers who are seeking to get their minds around security ?" (Blogcritics.org, May 29, 2006)

Tartalomjegyzék:
PART I: CONCEPTS & TRENDS

Information security management

Network & system security

Smartcard based solutions

Identity & access management

Biometrics

PART II: PRACTICAL EXPERIENCES

Risk management in the financial services industry

IT security in the automotive sector

Smart card applications for hospitals

IT Security for e-Government applications

Role-based access control in a corporation

Corporate badge & PKI for a global player

PART III: TECHNOLOGIES & STANDARDS

Cryptographic techniques

Public key infrastructure

Intelligent tokens

Identity & access management technologies

Process certification

Product certification