Apress Windows 10 Release Sale

Network Security Policies and Procedures

By Douglas W. Frye

  • eBook Price: $129.00
Buy eBook Buy Print Book

Network Security Policies and Procedures Cover Image

Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give a strong, multi-disciplinary understanding of how to pursue this goal by introducing the technical issues surrounding security.

Full Description

  • Add to Wishlist
  • ISBN13: 978-0-3873-0937-8
  • 256 Pages
  • User Level: Professionals
  • Publication Date: April 6, 2007
  • Available eBook Formats: PDF

Related Titles

  • Information Systems and Neuroscience
  • BPM - Driving Innovation in a Digital World
  • Data-Driven Process Discovery and Analysis
  • Physical Asset Management
  • Transactions on Large-Scale Data- and Knowledge-Centered Systems XVIII
  • UML @ Classroom
  • AIDA-CMK: Multi-Algorithm Optimization Kernel Applied to Analog IC Sizing
  • Computational Color Imaging
  • Uncertainty Quantification in Computational Fluid Dynamics and Aircraft Engines
  • Non-Linear Finite Element Analysis in Structural Mechanics
Full Description
Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on 'the other side of the fence' view an organization’s security and will thus be better equipped to act in a way that forwards an organization’s goals. Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.
Table of Contents

Table of Contents

  1. List of Figures.
  2. Preface.
  3. Acknowledgments and Dedication.
  4. Information Technology and its Role in the Modern Organization.
  5. The Extent of an Organization’s Connectivity.
  6. Network Physical Components.
  7. Legitimate Network Access.
  8. Illegitimate Network Access.
  9. Encryption.
  10. Balanced Scorecard.
  11. Sarbanes
  12. Oxley.
  13. Physical Security.
  14. Disaster Recovery.
  15. Initial Employee Communication.
  16. The Human Element.
  17. Email, Instant Messaging and Phishing.
  18. Network Administration.
  19. Network Monitoring.
  20. Executive Communication.
  21. Information Security Awareness.
  22. Synthesis and Conclusion.
  23. Draft Policies.
  24. Bibliography.
  25. Index.
Errata

Please Login to submit errata.

No errata are currently published

Best-Sellers

    1. Wireless Networking for Moving Objects

      $59.99

      View Details

    2. Device-Free Object Tracking Using Passive Tags

      $39.99

      View Details

    3. Seamless and Secure Communications over Heterogeneous Wireless Networks

      $39.99

      View Details

    4. Wireless Communications Networks for the Smart Grid

      $39.99

      View Details