INTRUSION MANAGEMENT: A METHODOLOGY FOR IMPLEMENTING AND MAINTAINING INFORMATION SECURITY
As we move farther into the Information Age, information becomes our greatest asset. Protection of these assets from unauthorized access, alteration or destruction is paramount. Intrusion Management: A Methodology for Implementing and Maintaining Information Security presents a sure-fire methodology to defend against intrusions or to apprehend the intruder. Based on techniques developed by the author and refined in real-world applications, the book covers four levels of intrusion management: avoidance, assurance, detection, and recovery. By implementing the methods in this guide, managers will have the peace of mind that comes from knowing their systems and data are safe.