
Syngress IT Security Project Management Handbook.
Title:
Syngress IT Security Project Management Handbook.
Author:
Snedaker, Susan.
ISBN:
9780080489773
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (642 pages)
Contents:
Cover -- Contents -- Foreword -- Acknowledgments -- Chapter 1: IT Security Project Management Building Blocks -- Introduction -- Corporate Security Project Plan Components -- The True Cost of Security -- Project Success Factors -- Project Constraints -- Corporate Strategy and IT Security -- How Corporate Culture and Policies Impact IT Security -- Chapter 2: Defining the Security Project -- Introduction -- Defining the Security Problem -- Defining the Outcome -- Defining Potential Security Project Solutions -- Defining the Optimal Security Project Solution -- Applying Security Project Constraints -- Developing the Security Project Proposal -- Identifying the Security Project Sponsor -- Chapter 3: Organizing the IT Security Project -- Introduction -- Identifying the IT Security Project Team -- Identifying IT Security Project Stakeholders -- Defining IT Security Project Requirements -- Defining IT Security Project Objectives -- Defining IT Security Project Processes -- Chapter 4: Building Quality Into IT Security Projects -- Introduction -- Planning IT Security Project Quality -- Monitoring IT Security Project Quality -- Testing IT Security Project Quality -- Chapter 5: Forming the IT Security Project Team -- Introduction -- Identifying IT Security Project Team Requirements -- Identifying Staffing Requirements and Constraints -- Acquiring the Needed Staff -- Forming the IT Security Project Team -- Chapter 6: Planning The IT Security Project -- Introduction -- Creating the IT Security Project Work Breakdown Structure -- Defining Project Tasks and Sub-tasks -- Checking Project Scope -- Developing Task Details -- Identifying and Working With the Critical Path -- Testing IT Security Project Results -- Budget, Schedule, Risks, and Communications -- Chapter 7: Managing the IT Security Project -- Introduction -- Initiating the IT Security Project.
Monitoring and Managing IT Security Project Progress -- Monitoring IT Security Project Risk -- Managing IT Security Project Change -- Testing IT Security Project Results -- Chapter 8: Closing Out the IT Security Project -- Introduction -- Evaluating Project Completion -- Closing Issues Log, Change Requests, and Error Reports -- Preparing for Implementation, Deployment, and Operational Transfer -- Reviewing Lessons Learned -- Documentation and Compliance Reports -- Chapter 9: Corporate IT Security Project Plan -- Introduction -- Defining Your Security Strategy -- Legal Standards Relevant to Corporate IT Security -- Corporate IT Security Project Plan Overview -- Corporate Security Auditing -- Corporate IT Security Project Parameters -- Project Work Breakdown Structure -- Project Risks -- Project Constraints -- Project Assumptions -- Project Schedule and Budget -- Chapter 10: General IT Security Plan -- Introduction -- IT Security Assessment and Auditing -- Authentication -- Access Control -- Auditing -- Attacks -- Assessment and Audit Report -- Project Plan -- General IT Security Project Parameters -- General IT Security Project Plan -- Chapter 11: IT Infrastructure Security Plan -- Introduction -- Infrastructure Security Assessment -- Project Parameters -- Project Team -- Project Organization -- Project Work Breakdown Structure -- Project Risks and Mitigation Strategies -- Project Constraints and Assumptions -- Project Schedule and Budget -- IT Infrastructure Security Project Outline -- Chapter 12: Wireless Security Project Plan -- Introduction -- Wireless Security Auditing -- Wireless Security Project Parameters -- Project Team -- Project Organization -- Project Work Breakdown Structure -- Project Risks -- Project Constraints and Assumptions -- Project Schedule and Budget -- Wireless Security Project Outline.
Chapter 13: IT Operational Security Plan -- Introduction -- Operational Security Assessment -- Project Parameters -- Project Team -- Project Organization -- Project Work Breakdown Structure -- Project Risks and Mitigation Strategies -- Project Constraints and Assumptions -- Project Schedule and Budget -- IT Operational Security Project Outline -- Index.
Abstract:
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Genre:
Added Author:
Electronic Access:
Click to View