Network Security Policies And Procedures at Meripustak

Network Security Policies And Procedures

Books from same Author: Douglas W. Frye

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Retail Price: ₹ 14041/- [ 15.00% off ]

    Seller Price: ₹ 11935

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 15.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 15.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Douglas W. Frye
    PublisherSpringer
    ISBN9780387309378
    Pages244
    BindingHardback
    LanguageEnglish
    Publish YearDecember 2006

    Description

    Springer Network Security Policies And Procedures by Douglas W. Frye

    Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view the company's security and will thus be better equipped to act in a way that forwards the company's goals._x000D_ _x000D_ Information Technology and Its Role in the Modern Organization.- The Extent of an Organization's Connectivity.- Network Physical Components.- Legitimate Network Access.- Illegitimate Network Access.- Encryption.- Balanced Scorecard.- Sarbanes-Oxley.- Physical Security.- Disaster Recovery.- Initial Employee Communication.- The Human Element.- Email, Instant Messaging and Phishing.- Network Administration.- Network Monitoring.- Executive Communication.- Information Security Awareness.- Synthesis and Conclusion.- Draft Policies._x000D_