This book provides a recent and relevant coverage based on a systematic approach. Especially suitable for practitioners and managers, the book has also been classroom tested in IS/IT courses on security. It presents a systematic approach to build total systems solutions that combine policies, procedures, risk analysis, threat assessment through attack trees, honeypots, audits, and commercially available security packages to secure the modern IT assets (applications, databases, hosts, middleware services and platforms) as well as the paths (the wireless plus wired network) to these assets. After covering the security management and technology principles, the book shows how these principles can be used to protect the digital enterprise assets. The emphasis is on modern issues such as e-commerce, e-business and mobile application security; wireless security that includes security of Wi-Fi LANs, cellular networks, satellites, wireless home networks, wireless middleware, and mobile application servers; semantic Web security with a discussion of XML security; Web Services security, SAML (Security Assertion Markup Language)and .NET security; integration of control and audit concepts in establishing a secure environment. Numerous real-life examples and a single case study that is developed throughout the book highlight a case-oriented approach. Complete instructor materials (PowerPoint slides, course outline, project assignments) to support an academic or industrial course are provided. Additional details can be found at the author website (www.amjadumar.com)
"synopsis" may belong to another edition of this title.
AMJAD UMAR, Ph.D. is a Senior Scientist at Bellcore, and an Adjunct Professor at Rutgers University, Stevens Institute of Technology and the Fordham Graduate School of Business. At Bellcore, he specializes in distributed systems, and consults/leads projects in middleware for advanced data networks, electronic commerce, data quality, Web access to corporate resources, large scale data management, and legacy system re-engineering. He is also author of the companion book "Object-Oriented Client/Server Internet Environments."
"About this title" may belong to another edition of this title.
£ 7.63 shipping from United Kingdom to U.S.A.
Destination, rates & speedsSeller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9780972741477
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9780972741477
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9780972741477_new
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9780972741477
Quantity: 10 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 1164. Seller Inventory # C9780972741477
Quantity: Over 20 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Seller Inventory # 595156754
Quantity: Over 20 available