1 / 120
文档名称:

Agile.IT.Security.Implementation.Methodology.Nov.2011.pdf

格式:pdf   页数:120
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Agile.IT.Security.Implementation.Methodology.Nov.2011.pdf

上传人:迅捷斥候 2013/1/27 文件大小:0 KB

下载得到文件列表

Agile.IT.Security.Implementation.Methodology.Nov.2011.pdf

文档介绍

文档介绍:AgileITSecurityImplementationMethodologyPlan,develop,anization'srobustagilesecuritywithIBM'sSeniorITSpecialistJeffLaskowskiprofessionalexpertisedistilledPUBLISHINGBIRMINGHAM-MUMBAIAgileITSecurityImplementationMethodologyCopyright©,storedinaretrievalsystem,ortransmittedinanyformorbyanymeans,withoutthepriorwrittenpermissionofthepublisher,,theinformationcontainedinthisbookissoldwithoutwarranty,,norPacktPublishing,,:November2011ProductionReference:,B32PB,-1-84968-570-2rImagebyDavidGimenez(******@)CreditsAuthorIndexerJeffLaskowskiTejalDaruwaleGraphicsAcquisitionEditorManuJosephRashmiPhadnisConidonMirandaTechnicalEditorAjayShankerProductionCoordinatorPrachaliBhiwandkarProjectCoordinatorCoverWorkJoelGoveyaPrachaliBhiwandkarProofreaderAaronNashAbouttheAuthorJeffLaskowskiC|EHisaseniorITSpecialistwithIBM'sSoftwaregroup,theauthorofAgileITSecurityImplementationMethodologies,,,,,especiallymywifeanddaughters,Nicole,Chloe,,AndrewLahser,,MichaelLaskowski,andAndreaSoultanian,forthemotivationtoworkonthisbook