Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2006 |
Language: | English |
Online Access: | |
Physical Description: | xxvi, 612 p. :; ill. |
Notes: | Includes index. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500261283 |
---|---|
ctrlnum |
(MiAaPQ)500261283 (Au-PeEL)EBL261283 (CaPaEBR)ebr10142560 (CaONFJC)MIL103571 (OCoLC)815528831 |
collection |
bib_alma |
record_format |
marc |
spelling |
Snedaker, Susan. Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor. IT security project management handbook Rockland, MA : Syngress Publishing, c2006. xxvi, 612 p. : ill. Includes index. Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer networks Security measures Handbooks, manuals, etc. Computer security Management Handbooks, manuals, etc. Electronic books. Rogers, Russ. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=261283 Click to View |
language |
English |
format |
Electronic eBook |
author |
Snedaker, Susan. |
spellingShingle |
Snedaker, Susan. Syngress IT security project management handbook Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. |
author_facet |
Snedaker, Susan. Rogers, Russ. ProQuest (Firm) ProQuest (Firm) |
author_variant |
s s ss |
author2 |
Rogers, Russ. ProQuest (Firm) |
author2_variant |
r r rr |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Snedaker, Susan. |
title |
Syngress IT security project management handbook |
title_full |
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor. |
title_fullStr |
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor. |
title_full_unstemmed |
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers, technical editor. |
title_auth |
Syngress IT security project management handbook |
title_alt |
IT security project management handbook |
title_new |
Syngress IT security project management handbook |
title_sort |
syngress it security project management handbook |
publisher |
Syngress Publishing, |
publishDate |
2006 |
physical |
xxvi, 612 p. : ill. |
contents |
Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 S655 42006 |
genre |
Electronic books. |
genre_facet |
Handbooks, manuals, etc. Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=261283 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
815528831 |
work_keys_str_mv |
AT snedakersusan syngressitsecurityprojectmanagementhandbook AT rogersruss syngressitsecurityprojectmanagementhandbook AT proquestfirm syngressitsecurityprojectmanagementhandbook AT snedakersusan itsecurityprojectmanagementhandbook AT rogersruss itsecurityprojectmanagementhandbook AT proquestfirm itsecurityprojectmanagementhandbook |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500261283 (Au-PeEL)EBL261283 (CaPaEBR)ebr10142560 (CaONFJC)MIL103571 (OCoLC)815528831 |
is_hierarchy_title |
Syngress IT security project management handbook |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330672855056384 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02002nam a2200385Ia 4500</leader><controlfield tag="001">500261283</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">060807s2006 maua s 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780080489773</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500261283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL261283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10142560</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL103571</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815528831</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S655 2006</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Syngress IT security project management handbook</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Susan Snedaker ; Russ Rogers, technical editor.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">IT security project management handbook</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Publishing,</subfield><subfield code="c">c2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 612 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=261283</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |