Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Who Should Read This Book?

This book was written for the network manager or network security manager. There are others who could benefit from reading it. Below is a list of chapters that each particular person in a company would benefit from reading:

  • Chief executive officer (CEO)— Chapters 2, 3, 4, and lastly, skim Chapters 12, 13, and 14. These chapters will provide a solid understanding of the technology and its applicability to an organization.

  • Chief information officer (CIO)— Chapters 2, 3, 4, 10, 11, and lastly, skim Chapters 12, 13, and 14. In reviewing these chapters, you will be best prepared to talk about and articulate the issues concerned with using the technology and the preparation required for successful deployment.

  • Project manager— Chapters 2, 12, 13, and 14. By reading these chapters, a project manager can become familiar with biometrics and the special project management tasks required to deliver a successful biometric project.

  • Network administrator or security specialist— Chapters 2–10, and skim Chapters 11–14. This way, the technology can be examined in greater detail and the project management chapters can be left for the use of the project manager.

  • + Share This
  • 🔖 Save To Your Account