Cart
Free Shipping in Australia
Proud to be B-Corp

Security Architecture: Design, Deployment and Operations Christopher King

Security Architecture: Design, Deployment and Operations By Christopher King

Security Architecture: Design, Deployment and Operations by Christopher King


36,99 $
Condition - Very Good
Only 2 left

Summary

Will more than 1.3 trillion dollars expected to be spent via e-business on the Internet by 2003, security has never been more important. This title offers a practical, step-by-step approach, and shows how to design and deploy security sucessfully across the enterprise.

Security Architecture: Design, Deployment and Operations Summary

Security Architecture: Design, Deployment and Operations by Christopher King

New from the official RSA Press, this expert resource explains how to design and deploy security successfully across your enterprise--and keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems, plus real-world case studies.

About Christopher King

Christopher King CISSP (Andover, MA) (Certified Information Systems Security Professional) is the Managing Principal of Greenwich Technology Partners. He has over 15 years of experience with various corporations such as Bell Atlantic, McGraw-Hill and Fidelity Investments as an Information Security consultant. Prior to joining Greenwich Technology Partners he served as a Cryptographic Engineer with The National Security Agency. He's a regular contributor to Information Security Magazine, Business Communication Review and Computer Security Review. Curtis Dalton (Georgetown, MA) CISSP, CCIE is a Consulting Engineer with Greenwich Technology Partners. He has over 12 years experience with companies such as Siemens Information and Communications Networks, Boston Technology Corp and Xerox designing and deploying large-scale network solutions in industries ranging from finance to telecommunications, manufacturing, and R&D. Ertam Osmanoglu (Malden, MA) is a Security Engineer with Greenwich Technology Partners. He has over over 5 years experience providing systems and security consulting and support services for Ernst and Young.

Table of Contents

Chapter 1: Business and Application Drivers (Case Study) Chapter 2: Security Polices, Standards, and Guidelines Chapter 3: Information Classification and Access Control Plan Chapter 4: Applying the Policies to Derive the Requirements Chapter 5: Security Infrastructure Design Principles Chapter 6: Network Partitioning Chapter 7: Virtual Private Networks Chapter 8: Wireless Security Chapter 9: Platform Hardening Chapter 10: Intrusion Detection Systems Chapter 11: Application Security Chapter 12: PKI: Components and Applications Chapter 13: Security Event Management and Consolidation Chapter 14: Security Management Chapter 15: Validation and Maturity

Additional information

GOR001610382
9780072133851
0072133856
Security Architecture: Design, Deployment and Operations by Christopher King
Used - Very Good
Paperback
McGraw-Hill Education - Europe
20010816
512
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Security Architecture: Design, Deployment and Operations