9781596932180-159693218X-Role Engineering for Enterprise Security Management (Information Security & Privacy)

Role Engineering for Enterprise Security Management (Information Security & Privacy)

ISBN-13: 9781596932180
ISBN-10: 159693218X
Edition: Illustrated
Author: John M. Davis, Edward J., Sr. Coyne
Publication date: 2007
Publisher: Artech House Publishers
Format: Hardcover 224 pages
FREE US shipping

Book details

ISBN-13: 9781596932180
ISBN-10: 159693218X
Edition: Illustrated
Author: John M. Davis, Edward J., Sr. Coyne
Publication date: 2007
Publisher: Artech House Publishers
Format: Hardcover 224 pages

Summary

Role Engineering for Enterprise Security Management (Information Security & Privacy) (ISBN-13: 9781596932180 and ISBN-10: 159693218X), written by authors John M. Davis, Edward J., Sr. Coyne, was published by Artech House Publishers in 2007. With an overall rating of 3.7 stars, it's a notable title among other Information Management (Processes & Infrastructure, Management & Leadership) books. You can easily purchase or rent Role Engineering for Enterprise Security Management (Information Security & Privacy) (Hardcover) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, computers, and networks. When hundred or thousands of computer users must be assigned their own individual access permission, role engineering saves significant time and money while protecting data and systems. This first-of-its-kind book illustrates the entire role engineering process, from project planning to deployment and verification. In addition to explaining technical aspects, the book emphasizes business benefits by showing how to manage risks and costs. Practitioners get proven techniques that define roles and ensure proper assignment of permissions and roles to users. The book also shows how to verify that roles comply with security policies.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book