The Best Damn IT Security Management Book Period
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing daily workload.
Coverage includes Business Continuity, Disaster Recovery, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration.
Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedaker, this volume is an indispensable addition to a serious security professional's toolkit.
* An all encompassing book, covering general security management issues and providing specific guidelines and checklists
* Anyone studying for a security specific certification or ASIS certification will find this a valuable resource
* The only book to cover all major IT and security management issues in one place: disaster recovery, project management, operations management, and risk assessment
Other editions - View all
activities applications appropriate areas asset attack audit backup baseline BC/DR plan business continuity business disruption business functions business impact analysis chapter communications company’s configuration continuity and disaster contract cost create customer’s database defined detail determine develop devices disaster recovery planning discussed document emergency employees ensure evaluation team event example Figure findings Freeware HIPAA host identify implement information security INFOSEC infrastructure Internet IP addresses look methodology Microsoft Windows mission-critical Nmap operating system options organization organization’s organizational outage password penetration test perform phase port port scan potential procedures requirements response risk assessment risk management risk mitigation strategies scanner scope security posture server SNMP solution specific steps team members technical threat sources types understand vendor vulnerability assessment vulnerability management Web server