01904nam a2200337Ia 4500001001200000003000800012006001900020007001500039008004100054020001800095020001500113040002100128035002100149050002800170082001400198100002100212245012700233246004400360260004900404300002500453500002000478505058200498533015201080650006701232650006001299655002901359700001801388710001701406856012601423999001701549ebr10142560CaPaEBRm u cr cn|||||||||060807s2006 maua s 001 0 eng d z9780080489773 z1597490768 aCaPaEBRcCaPaEBR a(OCoLC)56026077814aQA76.9.A25bS655 2006eb04a005.82221 aSnedaker, Susan.10aSyngress IT security project management handbookh[electronic resource] /cSusan Snedaker ; Russ Rogers, technical editor.30aIT security project management handbook aRockland, MA :bSyngress Publishing,cc2006. axxvi, 612 p. :bill. aIncludes index.0 aCh. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2009.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aComputer networksxSecurity measuresvHandbooks, manuals, etc. 0aComputer securityxManagementvHandbooks, manuals, etc. 7aElectronic books.2local1 aRogers, Russ.2 aebrary, Inc.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10142560zAn electronic book accessible through the World Wide Web; click to view c91077d91077