Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2006
Language:English
Online Access:
Physical Description:xxvi, 612 p. :; ill.
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500261283
ctrlnum (MiAaPQ)500261283
(Au-PeEL)EBL261283
(CaPaEBR)ebr10142560
(CaONFJC)MIL103571
(OCoLC)815528831
collection bib_alma
record_format marc
spelling Snedaker, Susan.
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor.
IT security project management handbook
Rockland, MA : Syngress Publishing, c2006.
xxvi, 612 p. : ill.
Includes index.
Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Computer networks Security measures Handbooks, manuals, etc.
Computer security Management Handbooks, manuals, etc.
Electronic books.
Rogers, Russ.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=261283 Click to View
language English
format Electronic
eBook
author Snedaker, Susan.
spellingShingle Snedaker, Susan.
Syngress IT security project management handbook
Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan.
author_facet Snedaker, Susan.
Rogers, Russ.
ProQuest (Firm)
ProQuest (Firm)
author_variant s s ss
author2 Rogers, Russ.
ProQuest (Firm)
author2_variant r r rr
author2_role TeilnehmendeR
TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Snedaker, Susan.
title Syngress IT security project management handbook
title_full Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor.
title_fullStr Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor.
title_full_unstemmed Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor.
title_auth Syngress IT security project management handbook
title_alt IT security project management handbook
title_new Syngress IT security project management handbook
title_sort syngress it security project management handbook
publisher Syngress Publishing,
publishDate 2006
physical xxvi, 612 p. : ill.
contents Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan.
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 S655 42006
genre Electronic books.
genre_facet Handbooks, manuals, etc.
Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=261283
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 815528831
work_keys_str_mv AT snedakersusan syngressitsecurityprojectmanagementhandbook
AT rogersruss syngressitsecurityprojectmanagementhandbook
AT proquestfirm syngressitsecurityprojectmanagementhandbook
AT snedakersusan itsecurityprojectmanagementhandbook
AT rogersruss itsecurityprojectmanagementhandbook
AT proquestfirm itsecurityprojectmanagementhandbook
status_str n
ids_txt_mv (MiAaPQ)500261283
(Au-PeEL)EBL261283
(CaPaEBR)ebr10142560
(CaONFJC)MIL103571
(OCoLC)815528831
is_hierarchy_title Syngress IT security project management handbook
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1792330672855056384
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02002nam a2200385Ia 4500</leader><controlfield tag="001">500261283</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">060807s2006 maua s 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780080489773</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500261283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL261283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10142560</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL103571</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815528831</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S655 2006</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Syngress IT security project management handbook</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Susan Snedaker ; Russ Rogers, technical editor.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">IT security project management handbook</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Publishing,</subfield><subfield code="c">c2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 612 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=261283</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>