Syngress IT Security Project Management Handbook and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Start reading Syngress IT Security Project Management Handbook on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Syngress IT Security Project Management Handbook [Paperback]

Susan Snedaker

List Price: CDN$ 76.95
Price: CDN$ 48.48 & FREE Shipping. Details
You Save: CDN$ 28.47 (37%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 2 to 4 weeks.
Ships from and sold by Gift-wrap available.


Amazon Price New from Used from
Kindle Edition CDN $41.99  
Paperback CDN $48.48  
Join Amazon Student in Canada

Book Description

Aug. 31 2006 1597490768 978-1597490764 1
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems.

The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.

* The first book devoted exclusively to managing IT security projects

* Expert authors combine superb project management skills with in-depth coverage of highly complex security projects

* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments

Product Details

Product Description

About the Author

Susan Snedaker, Principal Consultant and founder of Virtual Team Consulting, LLC has over 20 years' experience working in IT in both technical and executive positions including with Microsoft, Honeywell, and Logical Solutions. Her experience in executive roles at both Keane, Inc. and Apta Software, Inc. provided extensive strategic and operational experience in managing hardware, software and other IT projects involving both small and large teams. As a consultant, she and her team work with companies of all sizes to improve operations, which often entails auditing IT functions and building stronger project management skills, both in the IT department and company-wide. She has developed customized project management training for a number of clients and has taught project management in a variety of settings. Ms. Snedaker holds a Master's degree in Business Administration (MBA) and a Bachelor's degree in Management. She is a Microsoft Certified Systems Engineer (MCSE), a Microsoft Certified Trainer (MCT), and has a certificate in Advanced Project Management from Stanford University.

Inside This Book (Learn More)
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on (beta) 4.7 out of 5 stars  3 reviews
3 of 4 people found the following review helpful
4.0 out of 5 stars Good resource for IT Project Managers Sept. 24 2006
By Harold McFarland - Published on
In this book author Susan Snedaker covers the complete project management spectrum from the overall plan to individual project plans for various areas. The book is divided in to various sections including Defining, Organizing, Planning, Initiating, and Managing Change. She does a really good job of pointing out the importance of defining the project up front. This is a critically important step that is often overlooked. This is where you define the mission, expected outcomes, optimal solution, and constraints. If you don't know where you are going then the path there can be very convoluted and this is a common problem with IT projects of all types. Another exceptional section is the one on planning. In that section she details breaking down the overall project into tasks and sub-tasks as well as defining the scope and determining the critical path. For each chapter the highlights are presented in a checklist format at the end. IT Security Project Management Handbook is recommended to anyone who is in charge of a large scale IT project whether security or otherwise.
2 of 3 people found the following review helpful
5.0 out of 5 stars Great IT Security Project Resource July 20 2006
By TechMgr2B - Published on
This book is a must-have IT resource. It covers project management principles quickly and effectively and points out areas specific to the topic of Security throughout the PM process. In the later chapters, the author provides a very specific set of guidelines for developing any security-related project plan and provides examples of a broad-based corporate security initiative, a general IT security plan that can easily be customized to your own unique situation, an infrastructure security plan that can also be customized to address mission-critical infrastructure security issues. The book includes a wireless security plan to help you address the ever-changing and growing needs of wireless security in the organization. The final chapter might be the reason you buy the book - the operational security project plan. In many organizations (including the one I work in as well as those my friends work in), the operational piece is poorly planned and/or poorly executed so that all the work done through these meticulously planned security projects is put at risk through sloppy operational planning and implementation (after all, that's not very interesting to most of us in IT).

The book also addresses some of the legal issues surrounding security, which is great because it might alert you to things you might otherwise have overlooked or not known. The cost/benefit and risk analysis provided is also great ammo if you need to convince your management team as to why security spending is important (and shouldn't be subject to budget cuts anytime soon).

As with Snedaker's other books, this one is well-organized and written in a conversatational tone that you'll find a refreshing change from some of the other IT PM books out there. The chapters follow a logical flow and the information is presented in a way I found easy to implement. I previously purchased Snedaker's IT Project Management book last year and I have used it countless times. I have had this book for a few weeks and I can already tell by the dog-earred pages that I'll be using this one frequently as well.

I'd recommend this book to anyone in IT who deals with security or anyone who needs to "sell" their management on why security is important.
0 of 4 people found the following review helpful
5.0 out of 5 stars Review June 15 2009
By Johnny - Published on
I received the book in few days and in good condition. In my opinion, you can trust this seller.

Look for similar items by category