Narrow your search
Listing 1 - 10 of 13 << page
of 2
>>
Sort by
Managing software deliverables
Author:
ISBN: 1281072869 9786611072865 0080510930 9780080510934 155558313X 9781555583132 Year: 2004 Publisher: Amsterdam Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing Software Development describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need for these processes. In some instances, an organization may already have a PMO chartered with overall responsibility for each project managed in an enterprise. In those cases, this book will either provide validation of their efforts or it will provide some techniques and useful approaches that can be utilized to further improv

Managing software deliverables : a software development management methodology
Author:
ISBN: 9780080510934 0080510930 9781555583132 155558313X Year: 2004 Publisher: Boston Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing Software Development describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need for these processes. In some instances, an organization may already have a PMO chartered with overall responsibility for each project managed in an enterprise. In those cases, this book will either provide validation of their efforts or it will provide some techniques and useful approaches that can be utilized to further improve on their overall implementation of the PMO. In the vast majority of cases in business, however, a PMO is unheard of. Each project managed in the enterprise is unfortunately managed separately from all others (at great cost in both time and money to the enterprise). The book provides a downloadable "drop-in" web site containing every type of template needed to perform the activities described here. *Phase Roadmaps clearly depict what is expected by all parties at each phase of effort *Pre-built Intranet is ready to deploy in a corporate setting and provides immediate use *Process Methodology adheres to proven best-practices for software development.

Cybersecurity operations handbook
Authors: ---
ISBN: 1281035270 9786611035273 0080530184 1555583067 9781555583064 9780080530185 9781281035271 6611035273 Year: 2003 Publisher: Amsterdam Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and compl

Cybersecurity operations handbook
Authors: ---
ISBN: 9781555583064 1555583067 9780080530185 0080530184 1281035270 9781281035271 9786611035273 6611035273 Year: 2003 Publisher: Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security.

Business continuity and disaster recovery for infosec managers
Authors: ---
ISBN: 1555583393 9786611120429 1281120421 0080528333 9780080528335 9781555583392 Year: 2005 Publisher: Amsterdam Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes a

VoIP security
Authors: ---
ISBN: 1280964480 9786610964482 0080470467 1555583326 9781555583323 9780080470467 9781280964480 Year: 2005 Publisher: Amsterdam Boston Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late t

Wireless operational security
Authors: ---
ISBN: 1281022624 9786611022624 0080521193 1555583172 9780080521190 9781555583170 Year: 2004 Publisher: Burlington, MA Elsevier/Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired netwo

Instant messaging security
Authors: ---
ISBN: 1280630043 9786610630042 0080460720 1555583385 9781555583385 9780080460727 Year: 2005 Publisher: Amsterdam Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, bu

VoIP security
Authors: ---
ISBN: 9781555583323 1555583326 9780080470467 0080470467 1280964480 9781280964480 9786610964482 Year: 2005 Publisher: Amsterdam Boston Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late t

IM, instant messaging, security
Authors: ---
ISBN: 9781555583385 1555583385 Year: 2005 Publisher: Amsterdam Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. UNIQUE FEATURE/RATIONALE There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in todays corporate environment.

Listing 1 - 10 of 13 << page
of 2
>>
Sort by