Download Der IT Security Manager: Expertenwissen für jeden IT by Heinrich Kersten,Gerhard Klett,Klaus-Dieter Wolfenstetter PDF

By Heinrich Kersten,Gerhard Klett,Klaus-Dieter Wolfenstetter

Ein Buch, das den Sicherheitsverantwortlichen (und allen Interessierten) den "roten Faden" liefert, wie guy die IT-Sicherheit im Unternehmen angeht, wie guy sinnvolle defense rules und Sicherheitskonzepte schreibt, wie guy sukzessive zu einer stetigen Verbesserung der Sicherheit kommt, ist schon eine wesentliche Hilfe für die Praxis. Das hochkarätig besetzte Autoren-Team stellt in dieser shape erstmalig seine Erfahrungen auf dem Gebiet der IT-Sicherheit in Buchform vor. Dabei werden auch "brisante" Themen wie ISO 27001 "contra" Grundschutz nicht ausgelassen. Aufbau und Inhalt des Werks konnten bereits in vielen Seminaren zur Ausbildung von IT-Sicherheitsbeauftragten erprobt werden.

Show description

Read Online or Download Der IT Security Manager: Expertenwissen für jeden IT Security Manager - Von namhaften Autoren praxisnah vermittelt (Edition ) (German Edition) PDF

Best internet & networking books

EIGRP for IP: Basic Operation and Configuration (The Addison-Wesley Networking Basics Series)

The improved inside Gateway Protocol (EIGRP) from Cisco platforms is among the most generally used intra-domain routing protocols in todayis company networks. even supposing EIGRP is well configured, the interior workings are commonly now not good understood. the end result: nonoptimized networks that bring about persistent and expensive difficulties requiring time and effort to unravel.

Opportunistic Spectrum Utilization in Vehicular Communication Networks (SpringerBriefs in Electrical and Computer Engineering)

This short examines present study on enhancing Vehicular Networks (VANETs), reading spectrum shortage as a result of dramatic progress of cellular information site visitors and the restricted bandwidth of committed vehicular communique bands and using opportunistic spectrum bands to mitigate congestion. It stories present literature at the use of opportunistic spectrum bands for VANETs, together with authorized and unlicensed spectrum bands and various comparable applied sciences, reminiscent of cognitive radio, WiFi and device-to-device communications.

Mathematical and Engineering Methods in Computer Science: 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23-25, 2015, ... Papers (Lecture Notes in Computer Science)

This quantity includes the post-conference lawsuits of the tenth Doctoral Workshop on Mathematical and Engineering equipment in machine Science, MEMICS 2015, held in Telč, Czech Republic, in October 2015. the ten completely revised complete papers have been conscientiously chosen out of 25 submissions and are offered including three invited papers.

Potential-Based Analysis of Social, Communication, and Distributed Networks (Springer Theses)

This paintings makes significant contributions to the thriving zone of social, verbal exchange, and dispensed networks via introducing novel methodologies and instruments towards the examine of the evolutionary behaviors of those networks, in addition to their computational complexity and charges of convergence. by means of departing from the classical techniques and ends up in the literature, this paintings indicates that it really is attainable to address extra complicated and practical nonlinear versions the place both the conventional ways fail or bring about vulnerable effects.

Extra resources for Der IT Security Manager: Expertenwissen für jeden IT Security Manager - Von namhaften Autoren praxisnah vermittelt (Edition ) (German Edition)

Sample text

Download PDF sample

Rated 4.05 of 5 – based on 8 votes