Snedaker | Syngress IT Security Project Management Handbook | E-Book | sack.de
E-Book

E-Book, Englisch, 642 Seiten, Web PDF

Snedaker Syngress IT Security Project Management Handbook

E-Book, Englisch, 642 Seiten, Web PDF

ISBN: 978-0-08-048977-3
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems.

The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.

* The first book devoted exclusively to managing IT security projects

* Expert authors combine superb project management skills with in-depth coverage of highly complex security projects

* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments
Snedaker Syngress IT Security Project Management Handbook jetzt bestellen!

Zielgruppe


Academic/professional/technical: Research and professional


Autoren/Hrsg.


Weitere Infos & Material


1;Cover;1
2;Contents;13
3;Foreword;27
4;Acknowledgments;28
5;Chapter 1: IT Security Project Management Building Blocks;29
5.1;Introduction;30
5.2;Corporate Security Project Plan Components;31
5.3;The True Cost of Security;32
5.4;Project Success Factors;43
5.5;Project Constraints;49
5.6;Corporate Strategy and IT Security;51
5.7;How Corporate Culture and Policies Impact IT Security;52
6;Chapter 2: Defining the Security Project;59
6.1;Introduction;60
6.2;Defining the Security Problem;60
6.3;Defining the Outcome;65
6.4;Defining Potential Security Project Solutions;66
6.5;Defining the Optimal Security Project Solution;67
6.6;Applying Security Project Constraints;68
6.7;Developing the Security Project Proposal;72
6.8;Identifying the Security Project Sponsor;73
7;Chapter 3: Organizing the IT Security Project;79
7.1;Introduction;80
7.2;Identifying the IT Security Project Team;80
7.3;Identifying IT Security Project Stakeholders;81
7.4;Defining IT Security Project Requirements;83
7.5;Defining IT Security Project Objectives;87
7.6;Defining IT Security Project Processes;89
8;Chapter 4: Building Quality Into IT Security Projects;103
8.1;Introduction;104
8.2;Planning IT Security Project Quality;104
8.3;Monitoring IT Security Project Quality;113
8.4;Testing IT Security Project Quality;116
9;Chapter 5: Forming the IT Security Project Team;123
9.1;Introduction;124
9.2;Identifying IT Security Project Team Requirements;124
9.3;Identifying Staffing Requirements and Constraints;133
9.4;Acquiring the Needed Staff;135
9.5;Forming the IT Security Project Team;136
10;Chapter 6: Planning The IT Security Project;145
10.1;Introduction;146
10.2;Creating the IT Security Project Work Breakdown Structure;146
10.3;Defining Project Tasks and Sub-tasks;149
10.4;Checking Project Scope;151
10.5;Developing Task Details;153
10.6;Identifying and Working With the Critical Path;163
10.7;Testing IT Security Project Results;164
10.8;Budget, Schedule, Risks, and Communications;166
11;Chapter 7: Managing the IT Security Project;175
11.1;Introduction;176
11.2;Initiating the IT Security Project;176
11.3;Monitoring and Managing IT Security Project Progress;177
11.4;Monitoring IT Security Project Risk;185
11.5;Managing IT Security Project Change;186
11.6;Testing IT Security Project Results;189
12;Chapter 8: Closing Out the IT Security Project;197
12.1;Introduction;198
12.2;Evaluating Project Completion;198
12.3;Closing Issues Log, Change Requests, and Error Reports;200
12.4;Preparing for Implementation, Deployment, and Operational Transfer;201
12.5;Reviewing Lessons Learned;206
12.6;Documentation and Compliance Reports;209
13;Chapter 9: Corporate IT Security Project Plan;217
13.1;Introduction;218
13.2;Defining Your Security Strategy;218
13.3;Legal Standards Relevant to Corporate IT Security;220
13.4;Corporate IT Security Project Plan Overview;240
13.5;Corporate Security Auditing;243
13.6;Corporate IT Security Project Parameters;252
13.7;Project Work Breakdown Structure;267
13.8;Project Risks;273
13.9;Project Constraints;275
13.10;Project Assumptions;276
13.11;Project Schedule and Budget;276
14;Chapter 10: General IT Security Plan;289
14.1;Introduction;290
14.2;IT Security Assessment and Auditing;290
14.3;Authentication;326
14.4;Access Control;330
14.5;Auditing;332
14.6;Attacks;338
14.7;Assessment and Audit Report;343
14.8;Project Plan;348
14.9;General IT Security Project Parameters;353
14.10;General IT Security Project Plan;362
15;Chapter 11: IT Infrastructure Security Plan;373
15.1;Introduction;374
15.2;Infrastructure Security Assessment;374
15.3;Project Parameters;436
15.4;Project Team;447
15.5;Project Organization;448
15.6;Project Work Breakdown Structure;448
15.7;Project Risks and Mitigation Strategies;455
15.8;Project Constraints and Assumptions;457
15.9;Project Schedule and Budget;459
15.10;IT Infrastructure Security Project Outline;460
16;Chapter 12: Wireless Security Project Plan;469
16.1;Introduction;470
16.2;Wireless Security Auditing;471
16.3;Wireless Security Project Parameters;513
16.4;Project Team;528
16.5;Project Organization;529
16.6;Project Work Breakdown Structure;530
16.7;Project Risks;534
16.8;Project Constraints and Assumptions;535
16.9;Project Schedule and Budget;536
16.10;Wireless Security Project Outline;537
17;Chapter 13: IT Operational Security Plan;545
17.1;Introduction;546
17.2;Operational Security Assessment;547
17.3;Project Parameters;593
17.4;Project Team;605
17.5;Project Organization;606
17.6;Project Work Breakdown Structure;607
17.7;Project Risks and Mitigation Strategies;612
17.8;Project Constraints and Assumptions;614
17.9;Project Schedule and Budget;614
17.10;IT Operational Security Project Outline;615
18;Index;625


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.