For Immediate Release
Contact: Amy Pedersen
Syngress Publishing Announces Publication of "Syngress IT Security Project Management Handbook"
Book Provides First and Last Word on Managing IT Security Projects
Rockland, MA--Syngress Publishing, Inc., today announced the publication of "Syngress IT Security Project Management Handbook"
(ISBN:1597490768), by Susan Snedaker and edited by Russ Rogers.
According to Snedaker, "As the late management guru Peter Drucker once said, 'Plans are only good intentions unless they immediately degenerate into hard work.' The intent of this book is not to lead you through long, arduous planning processes while hackers are stealing your network out from under you. The intent is to provide you with effective network security planning tools so that you can 'degenerate into hard work' as quickly as possible to keep your network secure with the least amount of effort.
"Rather than losing sleep at night wondering who's wandering around your network in the dark, you can create a comprehensive security solution for your company that will meet your security needs today and will allow you to address new security requirements in the future. This book is designed to help you do exactly that."
The contents include: IT Security Project Management Building Blocks, Defining the Security Project, Organizing the IT Security Project, Building Quality into IT Security Projects, Forming the IT Security Project Team, Planning the IT Security Project, Managing the IT Security Project, Closing out the IT Security Project, Corporate IT Security Project Plan, General IT Security Plan, IT Infrastructure Security Plan, Wireless Security Project Plan, IT Operational Security Plan.
PRICE: $59.95 U.S.
PAGE COUNT: 656 PP
Inside the book coverage:
-Analyze the Cost of Prevention Versus Remediation
How to determine if preventing a security breach is less costly than
fixing it once it occurs.
-Identify the Right Project Management Team
Determine who will be affected and make certain they are on board from the
-Monitor IT Security Project Quality
Many companies must comply with specific monitoring requirements to meet
industry or governmental regulations.
-Create a Work Breakdown Structure (WBS)
Be sure that your WBS tasks are at the same level by keeping the level of
-Create Reliable Documentation
Your documentation should be well defined and completed in as near real
time as possible.
-Implement Individual Security Analysis Programs (ISAPs)
Testing requires an active "push" against security areas to ensure they
-Close the Issues Log, Change Requests, and Error Reports
Addressing known issues in a reasonable manner and documenting those
resolutions are important elements of reducing risk.
-Review Legal Standards Relevant to Your Project
Failure to understand the legal implications may leave your company at
substantial legal risk.
-Walk Through a Complete Plan
Includes a step-by-step security project plan for a security assessment
and audit project.
About the Authors
Susan Snedaker (MBA, BA, MCSE, MCT, CPM) is Principal Consultant and
founder of VirtualTeam Consulting, LLC (www.virtualteam.com), a consulting
firm specializing in business and technology consulting. The company works
with companies of all sizes to develop and implement strategic plans,
operational improvements and technology platforms that drive profitability
and growth. Prior to founding VirtualTeam in 2000, Susan held various
executive and technical positions with companies including Microsoft,
Honeywell, Keane, and Apta Software. As Director of Service Delivery for
Keane, she managed 1200+ technical support staff delivering phone and
email support for various Microsoft products including Windows Server
operating systems. She is author of "How to Cheat at IT Project Management"
(Syngress Publishing, ISBN: 1-597490-37-7) "The Best Damn Windows Server
2003 Book Period" (Syngress, ISBN: 1-931836-12-4), and "How to Cheat at
Managing Windows Small Business Server 2003" (Syngress, ISBN:
1-932266-80-1). She has also written numerous technical chapters for a
variety of Syngress Publishing books on Microsoft Windows and security
technologies and has written and edited technical content for various
publications. Susan has developed and delivered technical content from
security to telephony, TCP/IP to WiFi, CIW to IT project management and
just about everything in between (she admits a particular fondness for
anything related to TCP/IP).
Susan holds a master's degree in business administration and a bachelor's
degree in management from the University of Phoenix. She also holds a
certificate in advanced project management from Stanford University. She
holds Microsoft Certified Systems Engineer (MSCE) and Microsoft Certified
Trainer (MCT) certifications. Susan is a member of the Information
Technology Association of Southern Arizona (ITASA) and the Project
Management Institute (PMI).
Russ Rogers (CISSP, CISM, IAM, IEM, HonScD), technical editor, author of
the popular "Hacking a Terror Network" (Syngress Publishing, ISBN
1-928994-98-9), co-author on multiple other books including the best
selling "Stealing the Network: How to Own a Continent"(Syngress, ISBN
1-931836-05-1), "Network Security Evaluation Using the NSA IEM" (Syngress,
1-597490-35-0) and "Editor in Chief of The Security Journal"; is Co-Founder,
Chief Executive Officer, and Chief Technology Officer of Security Horizon;
a veteran-owned small business based in Colorado Springs, CO. Russ has
been involved in information technology since 1980 and has spent the last
15 years working professionally as both an IT and INFOSEC consultant. Russ
has worked with the United States Air Force (USAF), National Security
Agency (NSA), and the Defense Information Systems Agency (DISA). He is a
globally renowned security expert, speaker, and author who has presented
at conferences around the world including Amsterdam, Tokyo, Singapore, Sao
Paulo, and cities all around the United States.
Russ has an Honorary Doctorate of Science in Information Technology from
the University of Advancing Technology, a Masters Degree in Computer
Systems Management from the University of Maryland, a Bachelor of Science
in Computer Information Systems from the University of Maryland, and an
Associate Degree in Applied Communications Technology from the Community
College of the Air Force. He is a member of both ISSA and ISACA and
co-founded the Global Security Syndicate (gssyndicate.org), the Security
Tribe (securitytribe.com), and acts in the role of professor of network
security for the University of Advancing Technology (uat.edu).
Syngress Publishing (www.syngress.com), headquartered in Rockland,
Massachusetts, is an independent publisher of print and electronic
reference materials for Information Technology professionals seeking skill
enhancement and career advancement. Distributed throughout Europe, Asia,
and the U.S. and Canada, Syngress titles have been translated into twenty
languages. The company's pioneering customer support program,
firstname.lastname@example.org, extends the value of every Syngress title with
regular information updates and customer-driven author forums. For more
information on Syngress products, contact Amy Pedersen at 781-681-5151 or
email email@example.com. Syngress books are distributed in the United
States and Canada by O'Reilly Media, Inc.